A network security analyst suspects an ongoing exploitation of a system vulnerability. In order to capture and analyze the traffic for forensic investigation, the analyst plans to use a packet capturing tool. What is the primary benefit of performing a packet capture in this scenario?
To provide detailed network traffic analysis including suspicious payload and timestamps.
To identify peak usage times to plan for bandwidth allocation.
To measure the response time of services for improving quality of service (QoS).
To determine the top protocols in use for capacity planning.