During a forensic investigation, a security analyst reviews some Session Initiation Protocol packets that came from a suspicious IP address. Law enforcement requires access to a VoIP call that originated from the suspicious IP address. Which of the following should the analyst use to accomplish this task?
jleonard_ddc
Highly Voted 2Â years, 3Â months ago2Fish
2Â years, 3Â months agoRobV
Most Recent 1Â year, 6Â months agoChilaqui1es
1Â year, 8Â months agokiduuu
2Â years, 2Â months agoCyberNoob404
2Â years, 5Â months agotrainingsmits
2Â years, 5Â months agoj0n45
2Â years, 6Â months agonovolyus
1Â year, 7Â months agomrodmv
2Â years, 6Â months agoiking
2Â years, 6Â months agoComptia_Secret_Service
2Â years, 7Â months agoFrog_Man
2Â years, 7Â months agoSolventCourseisSCAM
2Â years, 7Â months agoforklord72
2Â years, 8Â months agoKingDeeko
2Â years, 8Â months agojagoichi
2Â years, 8Â months agosh4dali
2Â years, 9Â months agoadamhoms
2Â years, 9Â months ago