A security analyst is Investigating some unusual network traffic to and from one or the company's email servers. Reviewing a packet capture, the analyst notes the following sequence of packets:
Which of the following should be the NEXT step In the Investigation?
Currently there are no comments in this discussion, be the first to comment!