6.10.4 Practice Questions Security Pro

9 September 2022
4.7 (114 reviews)
8 test answers

Unlock all answers in this set

Unlock answers (4)
question
You want to identify traffic that is generated and sent through the network by a specific application running on a device. What tool should you use?
answer
Protocol analyzer
question
You want to know which protocols are being used on your network. You'd like to monitor network traffic and sort traffic protocol. Which tool should you use?
answer
Packet sniffer
question
You want to use a tool to see packets on a network, including the source and destination of each packet. Which tool should you use?
answer
Wireshark
question
You have a small network of devices connected together using a switch. You want to capture the traffic that is sent from Host A to Host B. On Host C, you install a packet sniffer that captures network traffic. After running the packet sniffer, you cannot find any captured packets between Host A and Host B. What should you do?
answer
Configure port mirroring
question
You are concerned about attacks directed against the firewall on your network. You would like to examine the content of individual frames sent to the network. Which tool should you use?
answer
Packet sniffer
question
You decide to use a packet sniffer to identify the type of traffic sent to a router. You run the packet sniffer software on a device which is connected to the same hub that is connected to the router. When you run the software, you only see frames addressed to the workstation and not other devices. Which feature should you configure?
answer
Promiscuous mode
question
You decide to use a packet sniffer to identify the type of traffic sent to a router. You run the packet sniffer software on a device which is connected to the same hub that is connected to the router. When you run the software, you only see frames addressed to the workstation and not other devices. Which feature should you configure?
answer
Mirroring
question
You have recently reconfigured FTP to require encryption of both passwords and data transfers. You would like to check the network traffic to verify that all FTP passwords and data are encrypted. Which tool should you use?
answer
Protocol analyzer