An incident response analyst is notified about suspicious network activity on a server. Which data source would provide a frame - by - frame analysis of captured traffic?
A. Packet captures
B. Network logs
C. Firewall logs
D. Metadata