An organization's security team has detected network spikes coming from the internal network. An investigation has concluded that the spike in traffic was from intensive network scanning. How should the analyst collect the traffic to isolate the suspicious host?
SecurityGuy
9 months, 1 week agosolodoc4l
1 year, 6 months agoEng_ahmedyoussef
1 year, 7 months ago