During a routine network analysis, you notice an unusually high amount of traffic coming from a single host. Suspecting a misconfigured application or a
potential security threat, you decide to investigate further using Wireshark. You alm to understand the nature of the traffic and identify the protocols
involved.
Which steps should you take in Wireshark to achieve this?
Use the "Statistics" menu to access the "Protocol Hierarchy" statistics to see the distribution of protocols
used by the host.
Use the "Edit" menu to change the colorization of packets to visually identify suspicious activity.
Export the packet capture and send it to a security analyst for further investigation.
Immediately apply a display filter for known malicious protocols to see if they are present.