uestion 1: Network Security (a) A security analyst team has the capture1.pcap, capture2.pcap and capture3.pcap files which are network traffic captures of different network segments. They need to identify potential attacks in these files. You are asked to assist them in their task by doing the following: i. [15 marks] Examine these pcap files to determine the attacks within these files using Wireshark; keep in mind, each file has only one attack. Justify your answers including the description of those identified attacks and some screenshots of parts in the traffic (the pcap files) which refer to the attacks if necessary. ii. [5 marks] It is important for security analysts to understand suspicious activity in pcap files. This is often done by reproducing attacks. Setup and execute the attack identified in capture3.pcap. Provide a screenshot of network traffic caused by your attack in Wireshark. Note: your pcap and the provided pcap files are not expected to be identical. You are not expected to reproduce the pcap content line by line, but it has to be the same attack..