Security analysts have noticed the network becomes flooded with malicious packets at specific times of the
day. Which of the following should the analysts use to investigate this issue?
A. Web metadata
B. Bandwidth monitors
C. System files
D. Correlation dashboards
day. Which of the following should the analysts use to investigate this issue?
A. Web metadata
B. Bandwidth monitors
C. System files
D. Correlation dashboards