Module H1: Network Analysis Tools Flashcards
A _____ is a standard procedure for regulating data transmission between computers.
protocol
What type of tool analyzes streams of protocol data and displays bits in a structured format?
Protocol Analyzer
Bit Analyzer
Protocol Debugger
Frame Sniffer
Protocol Analyzer
Which tool classification helps you solve problems based on past behaviors that you know already exist?
Proactive
Reactive
Active
Passive
Reactive
Local traffic analysis is the process of capturing \local network traffic that your interface sees.
True
False
True
- Which of the following would be considered a good baseline for your organization?
- A updated network configuration in anticipation of new threats.
- The default out of the box configuration for your infrastructure.
- A snapshot of the current known good configurations
- A network configuration you found on the internet.
A snapshot of the current known good configurations
Baselines are necessary to capture “normal” so that changes or abnormalities can be identified later.
True
False
True
________ _____________ is the process of gathering log data so that network developers can track resource use, bugs, availability, and other reportable issues.
- Server Performance
- Command Climate Survey
- Network Ping Test
- Application monitoring
Application monitoring
Load Balancing Metrics are used to evenly distribute the amount of data and information being sent and received over a network.
True
False
True
Packet _______ is typically done through packet capture programs which actually ‘capture’ the packets going across the networks.
analysis
A sniffer captures and logs all packets that pass through it for analysis or storage.
True
False
True
Which flag for the command “dumpcap” will print statistics for each interface every second?
-S
Which of the following switches in TCPDump is used to show the packet’s content in Hex and ASCII?
- D
- l
- X
- v
-X
What is the correct TCPDump syntax to write to a file named CBTC and analyzing port 80?
tcpdump port 80 -w CBTC
In a BPF, the second number behind the colon represents what?
- The length of the field
- The value of the field
- The start byte
- None of the above
The length of the field
Which of the following protocol headers cannot be used with BPFs?
- Ether
- ARP
- DHCP
- IPv6
DHCP