Watch this video on YouTube
In a scenario where malware performs data exfiltration, what type of traffic should be prioritized for deep packet inspection?