1.4k views
5 votes
Binnington was asked to recommend an analysis method that can determine if an attack has successfully penetrated the network. He decided on a method that only looked at the header information of captured packets. What analysis method did he select?

a.Anomaly analysis
b.Topology analysis
c.Protocol analysis
d.Packet analysis

1 Answer

2 votes

Answer:

Binnington chose a method to analyze the header information of captured packets in order to determine if an attack was successful in penetrating the network. This method specifically focuses on the protocol used in transmitting the packets and the structure of the packets' header. This is a form of protocol analysis, which can reveal patterns and anomalies that may indicate an attack or unauthorized access to the network. By solely analyzing the header information, this method helps to quickly identify potential threats and minimize the impact of a successful attack.

User Christian Sauer
by
8.0k points