Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Question 1 ( 1 point ) When examining data in Wireshark, the presence of _ _ _ _ _ _ _ _ in the Packet

Question 1(1 point)
When examining data in Wireshark, the presence of ________ in the Packet List pane indicates that the data comes from a wireless network.
Question 1 options:
TCP packets
Beacon frames
IP addresses
MAC addresses
Question 2(1 point)
In Wireshark, which of the following Protocol column filters would display only packets transported over a wireless network?
Question 2 options:
ICMP
Telnet
TCP
802.11
Question 3(1 point)
Which of the following is not a defining aspect of using TCP as a connection-oriented protocol?
Question 3 options:
Three-way handshake between the sender and receiver
Acknowledgment packet sent for each packet received
Sequence numbers assigned to each packet
Encryption of packet payload
Question 4(1 point)
Wireshark can be filtered to show ________ data by applying the ________ filter.
Question 4 options:
ping; ICMP
ssh; TCP
ping; TCP
ssh; ICMP
Question 5(1 point)
The Data Link Layer organizes bits into collections called ________, while the Network Layer encapsulates that information into units called ________.
Question 5 options:
frames; packets
packets; frames
ethernet; internet
internet; ethernet
Question 6(1 point)
Which of the following is an example of devices associated with the Transport Layer?
Question 6 options:
CAT5 cables or wifi signals
Switches or bridges
Routers
Ports
Question 7(1 point)
The Link Layer in the TCP/IP Model corresponds to the ________ and ________ Layers of the OSI Reference Model.
Question 7 options:
Network; Transport
Data Link; Network
Physical; Data Link
Transport; Physical
Question 8(1 point)
The Transport Layer uses source and destination ________ to address the proper services on the respective source and destination computers.
Question 8 options:
ports
IP addresses
routers
switches
Question 9(1 point)
User IDs and passwords sent through ________ are sent as ________ and are readable with Wireshark.
Question 9 options:
SSHv2; encrypted text
Telnet; encrypted text
SSHv2; clear text
Telnet; clear text
Question 10(1 point)
To capture Ethernet-based frames addressed to any/all IP addresses on a LAN segment, you need to use Wireshark in ________ mode.
Question 10 options:
Monitor
Promiscuous
Managed
Passive

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

SQL Server Query Performance Tuning

Authors: Sajal Dam, Grant Fritchey

4th Edition

1430267429, 9781430267423

More Books

Students also viewed these Databases questions

Question

What are three disadvantages of a civil service system?

Answered: 1 week ago

Question

What are three advantages of a civil service system?

Answered: 1 week ago