This is a dedicated watch page for a single video.
Romero, a network administrator, received a warning from IDS about a possibly malicious sequence of packets sent to a Web server in the network's external DMZ. The packet traffic was captured by the IDS and saved to a PCAP file. Now Romero needs to determine if these packets are genuinely malicious or simply a false positive. Which of the following type of network tools will he use?