Option A is probably the best answer. Analyzing the packet in the context of traffic history and connection state is a core function of network traffic interception.
B) Compare the data in the packet against the Anti-Malware Scan Configuration to verify whether any of the data related to files and folders on the Exclusion list.
I think option B is the correct answer. Checking the packet against the Anti-Malware Scan Configuration doesn't seem like a typical network traffic interception operation.
Anthony
23 days agoLuann
1 months agoHector
16 days agoTiera
17 days agoJade
1 months agoLevi
28 days agoDiane
29 days agoFrancine
1 months agoMindy
2 months agoCeola
13 days agoShelton
16 days agoRolande
27 days agoLynelle
2 months agoCassi
29 days agoVonda
1 months agoPenney
2 months agoGearldine
2 months agoPenney
2 months ago