Question: Network activity can be classified as normal, suspicious, or malicious. How is network activity differentiated? Provide examples. The response must be typed, single spaced, must be in times new roman font (size 12) and must follow the APA format.