PdfPrep.com

Which of the following should be used to identify the traffic?

A large amount of confidential data was leaked during a recent security breach. As part of a forensic investigation, the security team needs to identify the various types of traffic that were captured between two compromised devices.

Which of the following should be used to identify the traffic?
A . Carving
B . Disk imaging
C . Packet analysis
D . Memory dump
E . Hashing

Answer: C

Exit mobile version