Module H1: Network Analysis Tools Flashcards

1
Q

A _____ is a standard procedure for regulating data transmission between computers.

A

protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What type of tool analyzes streams of protocol data and displays bits in a structured format?

Protocol Analyzer
Bit Analyzer
Protocol Debugger
Frame Sniffer

A

Protocol Analyzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which tool classification helps you solve problems based on past behaviors that you know already exist?

Proactive
Reactive
Active
Passive

A

Reactive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Local traffic analysis is the process of capturing \local network traffic that your interface sees.

True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. Which of the following would be considered a good baseline for your organization?
  • A updated network configuration in anticipation of new threats.
  • The default out of the box configuration for your infrastructure.
  • A snapshot of the current known good configurations
  • A network configuration you found on the internet.
A

A snapshot of the current known good configurations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Baselines are necessary to capture “normal” so that changes or abnormalities can be identified later.

True

False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

________ _____________ is the process of gathering log data so that network developers can track resource use, bugs, availability, and other reportable issues.

  • Server Performance
  • Command Climate Survey
  • Network Ping Test
  • Application monitoring
A

Application monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Load Balancing Metrics are used to evenly distribute the amount of data and information being sent and received over a network.

True

False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Packet _______ is typically done through packet capture programs which actually ‘capture’ the packets going across the networks.

A

analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A sniffer captures and logs all packets that pass through it for analysis or storage.

True

False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which flag for the command “dumpcap” will print statistics for each interface every second?

A

-S

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following switches in TCPDump is used to show the packet’s content in Hex and ASCII?

  • D
  • l
  • X
  • v
A

-X

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the correct TCPDump syntax to write to a file named CBTC and analyzing port 80?

A

tcpdump port 80 -w CBTC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In a BPF, the second number behind the colon represents what?

  • The length of the field
  • The value of the field
  • The start byte
  • None of the above
A

The length of the field

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following protocol headers cannot be used with BPFs?

  • Ether
  • ARP
  • DHCP
  • IPv6
A

DHCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

If you are looking for ICMP traffic, what is the correct TCPdump syntax?

A

tcpdump icmp

17
Q

What is the correct TCPdump syntax to filter for traffic by source address with the following IP, 10.50.1.1?

A

tcpdump src 10.50.1.1

18
Q

To filter using tcpdump on interface eth0, what is the correct syntax?

A

tcpdump -i eth0

19
Q

What is the correct syntax to filter for traffic going to and from host 192.168.50.24?

A

tcpdump host 192.168.50.24

20
Q

What tool is a command line tool used to capture and display contents of a packet traversing a network interface?

  • TCPdump
  • Microsoft Network Monitor
  • Tshark
  • Wireshark
A

TCPdump

21
Q

Which function in Wireshark provides you with the computers that are talking to each other?

A

conversations

22
Q

Which protocol analyzer analyzes data from the wire or a packet capture?

A

wireshark

23
Q

Which function in Wireshark tells you the most used protocols?

A

protocol hierarchy