Which of the following should be used to identify the traffic?

Posted by: Pdfprep Category: CS0-002 Tags: , ,

A large amount of confidential data was leaked during a recent security breach. As part of a forensic investigation, the security team needs to identify the various types of traffic that were captured between two compromised devices.

Which of the following should be used to identify the traffic?
A . Carving
B . Disk imaging
C . Packet analysis
D . Memory dump
E . Hashing

Answer: C

Leave a Reply

Your email address will not be published.