A network security analyst suspects an ongoing exploitation of a system vulnerability. In order to capture and analyze the traffic for forensic investigation, the analyst plans to use a packet capturing tool. What is the primary benefit of performing a packet capture in this scenario?
To determine the top protocols in use for capacity planning.
To identify peak usage times to plan for bandwidth allocation.
To measure the response time of services for improving quality of service (QoS).
To provide detailed network traffic analysis including suspicious payload and timestamps.