I'm a little confused by the options here. Configuration auditing, synthetic testing, and interface-level monitoring don't seem like the most obvious use cases for packet capture. I'll have to think this through carefully.
This seems like a straightforward risk management question. I'll focus on understanding the key details - the project team members are being interviewed to evaluate the risk responses, so I think the answer is likely related to risk management techniques.
Gwenn
4 months agoCory
4 months agoAshley
4 months agoLuther
4 months agoEladia
4 months agoEleonore
5 months agoDominga
5 months agoAshley
5 months agoEna
5 months agoPamella
5 months agoRosio
5 months agoRosendo
5 months ago