Option A is probably the best answer. Analyzing the packet in the context of traffic history and connection state is a core function of network traffic interception.
B) Compare the data in the packet against the Anti-Malware Scan Configuration to verify whether any of the data related to files and folders on the Exclusion list.
I think option B is the correct answer. Checking the packet against the Anti-Malware Scan Configuration doesn't seem like a typical network traffic interception operation.
Ronald
1 days agoAnthony
2 months agoStephaine
5 days agoMing
7 days agoLuann
3 months agoHector
2 months agoTiera
2 months agoJade
3 months agoLevi
3 months agoDiane
3 months agoFrancine
3 months agoMindy
3 months agoCeola
2 months agoShelton
2 months agoRolande
2 months agoLynelle
4 months agoCassi
3 months agoVonda
3 months agoPenney
4 months agoGearldine
4 months agoPenney
4 months ago