ECCouncil 312-49v11 Question Answer
Dariel, a forensic investigator, has been assigned to investigate a recent security incident that occurred within the organization's network. As part of the investigation, Dariel installs a command-line interface packet sniffer on a Unix-based system to monitor and capture network traffic, looking for signs of unauthorized access or malicious activity. The captured data will help Dariel identify the sources of the security breach and trace the attacker's actions through the network. The tool used must be efficient for analyzing real-time network traffic and capable of running on a Unix-based operating system. Which of the following tools did Dariel employ in the above scenario?

