Answer the given questions as a group: What are three tools which can be used to monitor the network data bottlenecks? Explain these three tools. What are the potential merits and demerits of these tools? What are the three security tools which can be used to monitor the network security events or prevent network intrusion? Explain these three security tools. Describe the potential merits and demerits of these security tools? What five network processes, devices and systems must be continuously monitored for performance? Explain why?