WGU Cybersecurity-Architecture-and-Engineering Question Answer
An engineer has noticed increased network traffic originating from an unknown internet protocol (IP) address.
Which action should be taken to analyze the unusual network traffic patterns?