200-201 · Question #457
200-201 Question #457: Real Exam Question with Answer & Explanation
The correct answer is C: After identification, it helps to research a payload, which is the actual contents of the packet.. Full packet capture involves recording all network traffic for in-depth analysis. This allows security analysts to review both the headers (metadata) and the payloads (actual contents) of packets. After identifying suspicious traffic, full packet capture helps in detailed investi
Question
What is a description of the use of full packet capture in security monitoring?
Options
- AAfter analysis, it helps to identify security threats and network congestion, data/packet loss.
- BAfter detection, it helps to analyze the header that contains metadata, including the source and
- CAfter identification, it helps to research a payload, which is the actual contents of the packet.
- DAfter diagnoses, it helps to alter network traffic and removes detected malware.
Explanation
Full packet capture involves recording all network traffic for in-depth analysis. This allows security analysts to review both the headers (metadata) and the payloads (actual contents) of packets. After identifying suspicious traffic, full packet capture helps in detailed investigation of the payload to determine the nature of the threat, such as malware or unauthorized data transfers.
Topics
Community Discussion
No community discussion yet for this question.