Analysis should include
using tools such as Wireshark
capturing data flows.
Process/Skill Questions:
How can one identify the vulnerabilities in a production process?
How can one identify the data flows operating in Internet-of-Things (IoT) devices?