Which option can use deep-packet examination to determine the specific nature of an attack?