CiscoCisco
200-201 · Question #328
200-201 Question #328: Real Exam Question with Answer & Explanation
Sign in or unlock 200-201 to reveal the answer and full explanation for question #328. The question stem and answer options stay visible for context.
Submitted by kwame.gh· Mar 6, 2026Network Intrusion Analysis
Question
Why should an engineer use a full packet capture to investigate a security breach?
Options
- AIt provides the full TCP streams for the engineer to follow the metadata to identify the incoming
- BIt collects metadata for the engineer to analyze, including IP traffic packet data that is sorted,
- CIt reconstructs the event allowing the engineer to identify the root cause by seeing what took
- DIt captures the TCP flags set within each packet for the engineer to focus on suspicious packets
Unlock 200-201 to see the answer
You've previewed enough free 200-201 questions. Unlock 200-201 for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.
Topics
#Packet capture#Network forensics#Incident investigation#Root cause analysis