Given the following output from a Linux machine:
file2cable -i eth0 -f file.pcap
Which of the foll
owing BEST describes what a security analyst is trying to accomplish?
A. The analyst is attempting to measure bandwidth utilization on interface
eth0
.
B. The analyst is attempting to capture traffic on interface
eth0
.
C. The analyst is attempting to repla
y captured data from a PCAP file.
D. The analyst is attempting to capture traffic for a PCAP file.
E. The analyst is attempting to use a protocol analyzer to monitor network traffic.