A system security analyst wants to capture data flowing in and out of the enterprise. Which of the
following would MOST likely help in achieving this goal?

A.
Taking screenshots
B.
Analyzing Big Data metadata
C.
Analyzing network traffic and logs
D.
Capturing system image