Watch this video on YouTube
Which of the following is a network forensics analysis tool that can monitor and extract information from network traffic and capture application data contained in the network traffic?