Answer the given problems as a group: What are three tools which can be used to monitor the network data bottlenecks? describe these three tools. What are the potential merits and demerits of these tools? What are the three security tools which can be used to monitor the network security events or prevent network intrusion? describe these three security tools. Describe the potential merits and demerits of these security tools? What five network processes, devices and systems must be continuously monitored for performance? describe why?