During an investigation of unusual traffic on a company's network, an Incident Response team decides to utilize a specific protocol that samples network packets and sends the data to a collector for analysis. The protocol is designed to be scalable for high-speed networks. Which traffic monitoring protocol would be most appropriate for this situation?
|Operations and Incident Response
|Architecture and Design
|Governance, Risk, and Compliance
|Attacks, Threats, and Vulnerabilities