Question 47:
A large amount of confidential data was leaked during a recent security breach. As part of a forensic investigation, the security team needs to identify the various types of traffic that were captured between two compromised devices. Which of the following should be used to identify the traffic?
Answer options:
A. Carving B. Disk imaging C. Packet analysis D. Memory dump E. Hashing