What technique is employed to track the eccouncil video

 ·  PT1H46M27S  ·  EN

ethical-hacker video for what technique is employed to track the journey of a data packet from an untrusted external host to a secured internal host as it

Full Certification Question

What technique is employed to track the journey of a data packet from an untrusted external host to a secured internal host as it traverses through a firewall?