Exam 4: Sniffers
Exam 1: Ethics of Hacking and Cracking18 Questions
Exam 2: Reconnaissance17 Questions
Exam 3: Scanning Tools18 Questions
Exam 4: Sniffers18 Questions
Exam 5: TCP/IP Vulnerabilities18 Questions
Exam 6: Encryption and Password Cracking18 Questions
Exam 7: Spoofing18 Questions
Exam 8: Session Hijacking18 Questions
Exam 9: Hacking Network Devices18 Questions
Exam 10: Trojan Horses18 Questions
Exam 11: Denial-Of-Service Attacks18 Questions
Exam 12: Buffer Overflows18 Questions
Exam 13: Programming Exploits18 Questions
Exam 14: Mail Vulnerabilities18 Questions
Exam 15: Web Application Vulnerabilities18 Questions
Exam 16: Windows Vulnerabilities18 Questions
Exam 17: Unix/Linux Vulnerabilities18 Questions
Exam 18: Incident Handling19 Questions
Select questions type
____________________ is an application that monitors, filters, and captures data packets transferred over a network.
Free
(Short Answer)
4.8/5
(43)
Correct Answer:
sniffer
packet sniffer
Information traveling across a network is typically in human-readable format.
Free
(True/False)
4.8/5
(39)
Correct Answer:
False
When a sniffer captures data from a network, it stores the data in a(n) ____________________-a dynamic area of RAM that holds specified data.
Free
(Short Answer)
4.7/5
(31)
Correct Answer:
buffer
In order to identify a particular computer on a network, computers are assigned a unique identifier called a(n) ______________________________ address.
(Short Answer)
4.8/5
(29)
______________________________ is based on the principle that distance can be measured by computing the time required for reflected energy to be measured at the source.
(Short Answer)
4.8/5
(22)
Previously known as Ethereal, ____ is probably the best-known and most powerful free network protocol analyzer for UNIX/Linux and Windows.
(Multiple Choice)
4.8/5
(41)
A NIC can be set up to retrieve any data packet being transferred throughout the Ethernet network segment. This mode is known as _________________________.
(Short Answer)
4.7/5
(31)
Snort logs packets only into the American Standard Code for Information Interchange (ASCII) format.
(True/False)
4.8/5
(42)
What are the major differences between commercial sniffers and free sniffers?
(Essay)
4.8/5
(37)
When you transmit information in a data packet to a computer on a network, the request is sent to every computer on that network that uses the same Ethernet cable or wireless LAN.
(True/False)
4.8/5
(44)
____, the most commonly bundled sniffer with Linux distros, is also widely used as a free network diagnostic and analytic tool for UNIX and UNIX-like operating systems.
(Multiple Choice)
4.9/5
(32)
____ is bundled with the Solaris operating systems. It captures packets from the network and displays their contents.
(Multiple Choice)
5.0/5
(30)
The ____ captures the network traffic from the Ethernet connection.
(Multiple Choice)
4.8/5
(31)
____ comes bundled with Windows. Network Monitor, a component of Microsoft Systems Management Server (SMS), enables you to detect and troubleshoot problems on LANs,WANs, and serial links running the Microsoft Remote Access Server (RAS).
(Multiple Choice)
4.9/5
(27)
Sniffers look only at the traffic passing through the network interface adapter on the machine where the application is resident.
(True/False)
4.9/5
(34)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)