Posted by: Pdfprep
Post Date: April 13, 2021
A large amount of confidential data was leaked during a recent security breach. As part of a forensic investigation, the security team needs to identify the various types of traffic that were captured between two compromised devices.
Which of the following should be used to identify the traffic?
A . Carving
B . Disk imaging
C . Packet analysis
D . Memory dump
E . Hashing
Answer: C
Leave a Reply