Question 1
Wireshark is probably the most widely used packet capture and analysis software in the world. | ||
The expense of Wireshark makes it cost-prohibitive for most organizations. | ||
Compared to similar commercial products, Wireshark has the most sophisticated diagnostic tools. | ||
Wireshark saves frame details in a format that is incompatible and unusable by other software tools. |
5 points
Question 2
Capture Help | ||
Capture | ||
Files | ||
Online |
5 points
Question 3
Capture Help | ||
Host mode | ||
Subnet mode | ||
Promiscuous mode |
5 points
Question 4
byte summary | ||
byte data | ||
frame detail | ||
frame summary |
5 points
Question 5
byte summary | ||
byte data | ||
frame detail | ||
frame summary |
5 points
Question 6
byte summary | ||
byte data | ||
frame detail | ||
frame summary |
5 points
Question 7
in a peer-to-peer configuration. | ||
from a probe or hub. | ||
on a local area network. | ||
on a local host. |
5 points
Question 8
from a computer workstation to the Wireshark application window. | ||
to and from a computer workstation and the Wireshark application window. | ||
to and from a computer workstation and the server. | ||
to and from the Wireshark Network Analyzer and the Capture section of the Wireshark application window. |
5 points
Question 9
Where packets are captured and how they are captured does not have any impact on how the packets are analyzed. | ||
By running the Wireshark software on the same computer that generates the packets, the capture is specific to that machine. | ||
Wireshark has no impact on the operation of the machine itself or its applications. | ||
No timing information is provided when using a network probe or hub device, or the capture port of a LAN switch. |
5 points
Question 10
Clock time may or may not be the same as the system time of the device or devices used to run Wireshark and capture packets. | ||
The timestamp used by Wireshark is the current local time in the time zone where the machine resides. | ||
Any discrepancies regarding time are insignificant when capturing packets from high-speed interfaces. | ||
In order to overcome time zone mismatches, a common best practice is to use the Eastern Time Zone. |
5 points
Question 11
all packets are being captured effectively. | ||
partial or malformed packets might be captured. | ||
the interface speed is low and the computer cannot keep up with Wireshark. | ||
the computer is infected with some form of malware. |
5 points
Question 12
frame type | ||
source | ||
destination | ||
type of traffic carried in the next layer |
5 points
Question 13
frame type | ||
source | ||
destination | ||
type of traffic carried in the next layer |
5 points
Question 14
frame type | ||
source | ||
destination | ||
type of traffic carried in the next layer |
5 points
Question 15
origination | ||
destination | ||
host | ||
source |
5 points
Question 16
Filters are not a particularly useful tool in Wireshark. | ||
Filters allow a complex set of criteria to be applied to the captured packets and only the result is displayed. | ||
Filter expressions must be built with the Filter Edit dialog window and cannot be typed directly into the Filter field. | ||
Once packets have been filtered, they are lost and cannot be restored. |
5 points
Question 17
SYN, SYN-ACK, and ACK. | ||
SYN, ACK-SYN, and PSH. | ||
ACK, ACK-PSH, and PSH-ACK. | ||
PSH-ACK, ACK, and PSH-ACK. |
5 points
Question 18
Wireshark frame header | ||
Flow Graph Analysis results | ||
Frame Summary pane | ||
Ethernet II frame detail |
5 points
Question 19
DNS will continue to query higher level DNSs until it is able to resolve the address. | ||
DNS will continue to query lower level DNSs until it is able to resolve the address. | ||
DNS will discontinue querying other DNSs in attempts to resolve the address. | ||
DNS will be guaranteed show the response “No such name.” |
5 points
Question 20
issaseries.org domain never existed. | ||
issaseries.org domain existed at one time but no longer exists. | ||
issaseries.org is not known to any of the Domain Name Servers that were searched. | ||
search was ineffective or unsuccessful. |
Question 1
The Wireshark protocol analyzer has limited capabilities and is not considered multi-faceted. | ||
Wireshark is used to find anomalies in network traffic as well as to troubleshoot application performance issues. | ||
Both Wireshark and NetWitness Investigator are expensive tools that are cost-prohibitive for most organizations. | ||
NetWitness Investigator is available at no charge while Wireshark is a commercial product. |
5 points
Question 2
.packcng | ||
.paccapnextg | ||
.pcnextgen | ||
.pcapng |
5 points
Question 3
when using a pre-captured file. | ||
when capturing live traffic. | ||
when reviewing wireless traffic. | ||
in a virtual lab environment. |
5 points
Question 4
The Encapsulation type: Per-Packet Information header | ||
The Arrival time: May 11, 2007 15:30:37 041165000 Pacific Daylight Time | ||
The Capture Length: 181 bytes | ||
The Epoch Time: 1178922637.041165000 seconds |
5 points
Question 5
Windows Explorer | ||
DemoCapture | ||
Wireshark | ||
NetWitness |
5 points
Question 6
MAC+PHY (MAC and Physical Layer) | ||
IEEE Layer | ||
Flags fields | ||
Quality of Service information |
5 points
Question 7
antennae and signal strength | ||
transmitters and receivers of the data | ||
payload and frame information | ||
Domain System and Internet Protocol version |
5 points
Question 8
IEEE 802.11. | ||
GemtekTe_IEEE. | ||
GemtekTe_00:14:a5. | ||
GemtekTe_cd:74:7b. |
5 points
Question 9
MAC addresses | ||
IP addresses | ||
brand names | ||
IEEE numbers |
5 points
Question 10
There are hundreds of fields of data available and there are many different ways to interpret them. | ||
There are a few dozen fields of data available but there are many different ways to interpret them. | ||
There are very few fields of data available and most administrators will interpret them in the same or a similar way. | ||
Although there are very few fields of data available, most administrators will interpret them differently. |
5 points
Question 11
3Com | ||
QoS | ||
GemtekTE | ||
AirPcap |
5 points
Question 12
information regarding the transmitters and receivers of the data. | ||
detail about the Internet Protocol version. | ||
a Domain Name System query. | ||
evidence of any suspicious activity. |
5 points
Question 13
172.30.0.100 | ||
130.192.73.1 | ||
177.390.13.6 | ||
172.30.121.1 |
5 points
Question 14
web01.polito.gov | ||
web01.polito.it | ||
web01.polito.com | ||
www.polito.com |
5 points
Question 15
.libpcap | ||
.tcpdump-libcap | ||
.pcapng | ||
.pcap |
5 points
Question 16
NetWitness Investigator is available for free so it is only used for some initial analysis. | ||
NetWitness Investigator is often used only by skilled analysts for specific types of analysis. | ||
Investigators with little training typically can capture needed information using NetWitness Investigator. | ||
Wireshark provides a more in-depth, security-focused analysis than NetWitness Investigator. |
5 points
Question 17
NetWitness reports contain only low-level wireless information, such as command and control. | ||
NetWitness reports do not provide the kind of sophisticated analysis that is found within Wireshark. | ||
NetWitness and Wireshark both provide the same information but the two tools differ in how that information is displayed. | ||
NetWitness is unable to provide information about the geographic location of the transmitter and receiver. |
5 points
Question 18
DemoCapture | ||
Wireshark | ||
NetWitness Investigator | ||
Both Wireshark and NetWitness Investigator |
5 points
Question 19
Turin Polytechnic. | ||
Politecnico de Tourino. | ||
Republic of Italia. | ||
Turin, Italy. |
5 points
Question 20
The Top Level Domain (TLD) “.it” belongs to Italy. | ||
The Top Level Domain (TLD) “.it” is proofthat the Web site is physically located in Italy. | ||
The Top Level Domain (TLD) was actually registered in the United States. |