You have been called in to help with an investigation of an alleged network intrusion. After questioning the
members of the company IT department, you search through the server log files to find any trace of the
intrusion. After that you decide to telnet into one of the company routers to see if there is any evidence to be
found. While connected to the router, you see some unusual activity and believe that the attackers are currently
connected to that router. You start up an ethereal session to begin capturing traffic on the router that could be
used in the investigation. At what layer of the OSI model are you monitoring while watching traffic to and from
the router?
A.
Network
B.
Transport
C.
Data Link
D.
Session