Which of the follow...
 
Notifications
Clear all

Which of the following should be used to identify the traffic?

1 Posts
1 Users
0 Likes
262 Views
(@bulluckrolando)
Noble Member
Joined: 2 years ago
Posts: 664
Topic starter  

A large amount of confidential data was leaked during a recent security breach. As part of a forensic investigation, the security team needs to identify the various types of traffic that were captured between two compromised devices.

Which of the following should be used to identify the traffic?

  • A . Carving
  • B . Disk imaging
  • C . Packet analysis
  • D . Memory dump
  • E . Hashing

Show Answer Hide Answer

Suggested Answer: C

   
Quote
Topic Tags

Latest CompTIA CS0-002 Dumps Valid Version

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Share: