List of questions
Related questions
Question 264 - 200-201 discussion
Why should an engineer use a full packet capture to investigate a security breach?
A.
It captures the TCP flags set within each packet for the engineer to focus on suspicious packets to identify malicious activity
B.
It collects metadata for the engineer to analyze, including IP traffic packet data that is sorted, parsed, and indexed.
C.
It provides the full TCP streams for the engineer to follow the metadata to identify the incoming threat.
D.
It reconstructs the event allowing the engineer to identify the root cause by seeing what took place during the breach
Your answer:
0 comments
Sorted by
Leave a comment first