An information security analyst observes anomalous behavior on the SCADA devices in a power plant. This behavior results in the industrial generators overheating and destabilizing the power supply.
Which of the following would BEST identify potential indicators of compromise?
A . Use Burp Suite to capture packets to the SCADA device’s I
C . Use tcpdump to capture packets from the SCADA device I
E . Use Wireshark to capture packets between SCADA devices and the management system.
F . Use Nmap to capture packets from the management system to the SCADA devices.
Answer: C