SlideShare a Scribd company logo
1 of 12
20 questions , multiple choice
Question 1
1.
Which of the following statements is true?
[removed]
The Wireshark protocol analyzer has limited capabilities and is
not considered multi-faceted.
[removed]
Wireshark is used to find anomalies in network traffic as well as
to troubleshoot application performance issues.
[removed]
Both Wireshark and NetWitness Investigator are expensive tools
that are cost-prohibitive for most organizations.
[removed]
NetWitness Investigator is available at no charge while
Wireshark is a commercial product.
5 points
Question 2
1.
Wireshark capture files, like the DemoCapturepcap file found in
this lab, have a __________ extension, which stands for packet
capture, next generation.
[removed]
.packcng
[removed]
.paccapnextg
[removed]
.pcnextgen
[removed]
.pcapng
5 points
Question 3
1.
The Wireless Toolbar (View > Wireless Toolbar) is used only:
[removed]
when using a pre-captured file.
[removed]
when capturing live traffic.
[removed]
when reviewing wireless traffic.
[removed]
in a virtual lab environment.
5 points
Question 4
1.
In the frame detail pane, which of the following was a field
unique to wireless traffic, confirming that it is a wireless
packet?
[removed]
The Encapsulation type: Per-Packet Information header
[removed]
The Arrival time: May 11, 2007 15:30:37 041165000 Pacific
Daylight Time
[removed]
The Capture Length: 181 bytes
[removed]
The Epoch Time: 1178922637.041165000 seconds
5 points
Question 5
1.
Which of the following tools provides information about the
antennae signal strengths, noise ratios, and other antennae
information during a captured transmission?
[removed]
Windows Explorer
[removed]
DemoCapture
[removed]
Wireshark
[removed]
NetWitness
5 points
Question 6
1.
Which of the following can be used to map who is able to
communicate with whom, the measured strength of signals, and
what frequencies are used, as well as be used for jamming
certain frequencies and for determining which devices were
likely used to set off remote bombs and Improvised Explosive
Devices (IEDs)?
[removed]
MAC+PHY (MAC and Physical Layer)
[removed]
IEEE Layer
[removed]
Flags fields
[removed]
Quality of Service information
5 points
Question 7
1.
In the IEEE 802.11 Quality of Service information and Flags
fields, Wireshark displays information about the __________,
which enables the network administrator to determine which
Media Access Control (MAC) addresses match each of them.
[removed]
antennae and signal strength
[removed]
transmitters and receivers of the data
[removed]
payload and frame information
[removed]
Domain System and Internet Protocol version
5 points
Question 8
1.
In the lab, Wireshark displayed the transmitter/receiver address
in both full hexadecimal (00:14:a5:cd:74:7b) and a kind of
shorthand, which was:
[removed]
IEEE 802.11.
[removed]
GemtekTe_IEEE.
[removed]
GemtekTe_00:14:a5.
[removed]
GemtekTe_cd:74:7b.
5 points
Question 9
1.
Matching the __________ to their appropriate transmitter and
receiver addresses can provide the needed forensic evidence of
which devices are involved in a particular communication.
[removed]
MAC addresses
[removed]
IP addresses
[removed]
brand names
[removed]
IEEE numbers
5 points
Question 10
1.
Which of the following statements is true regarding the fields
displayed in Wireshark?
[removed]
There are hundreds of fields of data available and there are
many different ways to interpret them.
[removed]
There are a few dozen fields of data available but there are
many different ways to interpret them.
[removed]
There are very few fields of data available and most
administrators will interpret them in the same or a similar way.
[removed]
Although there are very few fields of data available, most
administrators will interpret them differently.
5 points
Question 11
1.
Which of the following is a packet capture add-on that is
frequently installed with Wireshark that enables the capture of
more wireless information?
[removed]
3Com
[removed]
QoS
[removed]
GemtekTE
[removed]
AirPcap
5 points
Question 12
1.
Regardless of whether the packet is sent through the air or on a
wire, the ultimate payload in an investigation is:
[removed]
information regarding the transmitters and receivers of the data.
[removed]
detail about the Internet Protocol version.
[removed]
a Domain Name System query.
[removed]
evidence of any suspicious activity.
5 points
Question 13
1.
In the lab, the DNS query indicated an IP address of
__________ for www.polito.it.
[removed]
172.30.0.100
[removed]
130.192.73.1
[removed]
177.390.13.6
[removed]
172.30.121.1
5 points
Question 14
1.
What is the actual Web host name to which www.polito.it is
resolved?
[removed]
web01.polito.gov
[removed]
web01.polito.it
[removed]
web01.polito.com
[removed]
www.polito.com
5 points
Question 15
1.
In order to use NetWitness Investigator to analyze the same
packets that you analyzed with Wireshark, you first had to save
the DemoCapturepcap.pcapng file in the older __________
format.
[removed]
.libpcap
[removed]
.tcpdump-libcap
[removed]
.pcapng
[removed]
.pcap
5 points
Question 16
1.
Which of the following statements is true regarding NetWitness
Investigator?
[removed]
NetWitness Investigator is available for free so it is only used
for some initial analysis.
[removed]
NetWitness Investigator is often used only by skilled analysts
for specific types of analysis.
[removed]
Investigators with little training typically can capture needed
information using NetWitness Investigator.
[removed]
Wireshark provides a more in-depth, security-focused analysis
than NetWitness Investigator.
5 points
Question 17
1.
Which of the following statements is true regarding NetWitness
Investigator reports?
[removed]
NetWitness reports contain only low-level wireless information,
such as command and control.
[removed]
NetWitness reports do not provide the kind of sophisticated
analysis that is found within Wireshark.
[removed]
NetWitness and Wireshark both provide the same information
but the two tools differ in how that information is displayed.
[removed]
NetWitness is unable to provide information about the
geographic location of the transmitter and receiver.
5 points
Question 18
1.
Which of the following tools displays the MAC address and IP
address information and enables them to be correlated for a
given capture transmission?
[removed]
DemoCapture
[removed]
Wireshark
[removed]
NetWitness Investigator
[removed]
Both Wireshark and NetWitness Investigator
5 points
Question 19
1.
When you were using NetWitness Investigator in the lab, the
Destination City report indicated that the Destination
Organization of www.polito.it was recorded as:
[removed]
Turin Polytechnic.
[removed]
Politecnico de Tourino.
[removed]
Republic of Italia.
[removed]
Turin, Italy.
5 points
Question 20
1.
Which of the following statements is true regarding the
information in the Destination City report?
[removed]
The Top Level Domain (TLD) ".it" belongs to Italy.
[removed]
The Top Level Domain (TLD) ".it" is proofthat the Web site is
physically located in Italy.
[removed]
The Top Level Domain (TLD) was actually registered in the
United States.
[removed]
It indicates that it will be impossible to determine the actual
physical location of the server.
20 questions , multiple choiceQuestion 11.Which of the fol.docx

More Related Content

Similar to 20 questions , multiple choiceQuestion 11.Which of the fol.docx

The Network Ip Address Scheme
The Network Ip Address SchemeThe Network Ip Address Scheme
The Network Ip Address Scheme
Erin Rivera
 
272018 Review Test Submission Lab 8 Quiz – 2018_...http.docx
272018 Review Test Submission Lab 8 Quiz – 2018_...http.docx272018 Review Test Submission Lab 8 Quiz – 2018_...http.docx
272018 Review Test Submission Lab 8 Quiz – 2018_...http.docx
tamicawaysmith
 
1 SDEV 460 – Homework 4 Input Validation and Busine
1  SDEV 460 – Homework 4 Input Validation and Busine1  SDEV 460 – Homework 4 Input Validation and Busine
1 SDEV 460 – Homework 4 Input Validation and Busine
VannaJoy20
 
NETWORKING SYSTEMS .docx
NETWORKING SYSTEMS                                                .docxNETWORKING SYSTEMS                                                .docx
NETWORKING SYSTEMS .docx
dohertyjoetta
 
Culturally Responsive Literacy Resources Template Part 1.docx
Culturally Responsive Literacy Resources Template Part 1.docxCulturally Responsive Literacy Resources Template Part 1.docx
Culturally Responsive Literacy Resources Template Part 1.docx
dorishigh
 

Similar to 20 questions , multiple choiceQuestion 11.Which of the fol.docx (20)

Netw 208 Success Begins / snaptutorial.com
Netw 208  Success Begins / snaptutorial.comNetw 208  Success Begins / snaptutorial.com
Netw 208 Success Begins / snaptutorial.com
 
Ecet 375 Enhance teaching / snaptutorial.com
Ecet 375  Enhance teaching / snaptutorial.comEcet 375  Enhance teaching / snaptutorial.com
Ecet 375 Enhance teaching / snaptutorial.com
 
Significance
SignificanceSignificance
Significance
 
ECET 375 Success Begins/Newtonhelp.com
ECET 375 Success Begins/Newtonhelp.comECET 375 Success Begins/Newtonhelp.com
ECET 375 Success Begins/Newtonhelp.com
 
The Network Ip Address Scheme
The Network Ip Address SchemeThe Network Ip Address Scheme
The Network Ip Address Scheme
 
9Tuts.Com New CCNA 200-120 New CCNA New Questions 2
9Tuts.Com New CCNA 200-120 New CCNA   New Questions 29Tuts.Com New CCNA 200-120 New CCNA   New Questions 2
9Tuts.Com New CCNA 200-120 New CCNA New Questions 2
 
272018 Review Test Submission Lab 8 Quiz – 2018_...http.docx
272018 Review Test Submission Lab 8 Quiz – 2018_...http.docx272018 Review Test Submission Lab 8 Quiz – 2018_...http.docx
272018 Review Test Submission Lab 8 Quiz – 2018_...http.docx
 
ENSA_Module_12.pptx
ENSA_Module_12.pptxENSA_Module_12.pptx
ENSA_Module_12.pptx
 
1.5.7 packet-tracer---network-representation (1)
1.5.7 packet-tracer---network-representation (1)1.5.7 packet-tracer---network-representation (1)
1.5.7 packet-tracer---network-representation (1)
 
Wireshark
Wireshark Wireshark
Wireshark
 
1 SDEV 460 – Homework 4 Input Validation and Busine
1  SDEV 460 – Homework 4 Input Validation and Busine1  SDEV 460 – Homework 4 Input Validation and Busine
1 SDEV 460 – Homework 4 Input Validation and Busine
 
ECET 380 Entire Course NEW
ECET 380 Entire Course NEWECET 380 Entire Course NEW
ECET 380 Entire Course NEW
 
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
 
NETWORKING SYSTEMS .docx
NETWORKING SYSTEMS                                                .docxNETWORKING SYSTEMS                                                .docx
NETWORKING SYSTEMS .docx
 
Ceh v8 labs module 08 sniffers
Ceh v8 labs module 08 sniffersCeh v8 labs module 08 sniffers
Ceh v8 labs module 08 sniffers
 
Network monitoring tools
Network monitoring toolsNetwork monitoring tools
Network monitoring tools
 
Tcp performance Final Report
Tcp performance Final Report Tcp performance Final Report
Tcp performance Final Report
 
Ccna 4 chapter 8 v4.0 answers 2011
Ccna 4 chapter 8 v4.0 answers 2011Ccna 4 chapter 8 v4.0 answers 2011
Ccna 4 chapter 8 v4.0 answers 2011
 
Netfilter: Making large iptables rulesets scale
Netfilter: Making large iptables rulesets scaleNetfilter: Making large iptables rulesets scale
Netfilter: Making large iptables rulesets scale
 
Culturally Responsive Literacy Resources Template Part 1.docx
Culturally Responsive Literacy Resources Template Part 1.docxCulturally Responsive Literacy Resources Template Part 1.docx
Culturally Responsive Literacy Resources Template Part 1.docx
 

More from vickeryr87

COLLEGEPHYSICS LAB REPORTSTUDENTS NAME.docx
COLLEGEPHYSICS LAB REPORTSTUDENTS NAME.docxCOLLEGEPHYSICS LAB REPORTSTUDENTS NAME.docx
COLLEGEPHYSICS LAB REPORTSTUDENTS NAME.docx
vickeryr87
 
Collins did not understand the events that led to the reasoning .docx
Collins did not understand the events that led to the reasoning .docxCollins did not understand the events that led to the reasoning .docx
Collins did not understand the events that led to the reasoning .docx
vickeryr87
 
Define civilization. Do we really need it in order to survive and pr.docx
Define civilization. Do we really need it in order to survive and pr.docxDefine civilization. Do we really need it in order to survive and pr.docx
Define civilization. Do we really need it in order to survive and pr.docx
vickeryr87
 

More from vickeryr87 (20)

COLLEGEPHYSICS LAB REPORTSTUDENTS NAME.docx
COLLEGEPHYSICS LAB REPORTSTUDENTS NAME.docxCOLLEGEPHYSICS LAB REPORTSTUDENTS NAME.docx
COLLEGEPHYSICS LAB REPORTSTUDENTS NAME.docx
 
Collins did not understand the events that led to the reasoning .docx
Collins did not understand the events that led to the reasoning .docxCollins did not understand the events that led to the reasoning .docx
Collins did not understand the events that led to the reasoning .docx
 
Define discrimination, victimization and affirmative actions; .docx
Define discrimination, victimization and affirmative actions; .docxDefine discrimination, victimization and affirmative actions; .docx
Define discrimination, victimization and affirmative actions; .docx
 
Define data mining. Why are there many names and definitions for d.docx
Define data mining. Why are there many names and definitions for d.docxDefine data mining. Why are there many names and definitions for d.docx
Define data mining. Why are there many names and definitions for d.docx
 
Define culture. How can culture be conceptionalizedDiscuss at l.docx
Define culture. How can culture be conceptionalizedDiscuss at l.docxDefine culture. How can culture be conceptionalizedDiscuss at l.docx
Define culture. How can culture be conceptionalizedDiscuss at l.docx
 
Define cultural relativism and how it is used by anthropologis.docx
Define cultural relativism and how it is used by anthropologis.docxDefine cultural relativism and how it is used by anthropologis.docx
Define cultural relativism and how it is used by anthropologis.docx
 
Define cost control and provide several examples of how it affec.docx
Define cost control and provide several examples of how it affec.docxDefine cost control and provide several examples of how it affec.docx
Define cost control and provide several examples of how it affec.docx
 
Define corporate governance.Discuss the events that led up.docx
Define corporate governance.Discuss the events that led up.docxDefine corporate governance.Discuss the events that led up.docx
Define corporate governance.Discuss the events that led up.docx
 
Define communication in your own words. Identify and distinguish amo.docx
Define communication in your own words. Identify and distinguish amo.docxDefine communication in your own words. Identify and distinguish amo.docx
Define communication in your own words. Identify and distinguish amo.docx
 
Define Civil Liberties. List 5 Civil Liberties. How do they differ.docx
Define Civil Liberties. List 5 Civil Liberties. How do they differ.docxDefine Civil Liberties. List 5 Civil Liberties. How do they differ.docx
Define Civil Liberties. List 5 Civil Liberties. How do they differ.docx
 
Define civilization. Do we really need it in order to survive and pr.docx
Define civilization. Do we really need it in order to survive and pr.docxDefine civilization. Do we really need it in order to survive and pr.docx
Define civilization. Do we really need it in order to survive and pr.docx
 
Define case management and care management and compare the dif.docx
Define case management and care management and compare the dif.docxDefine case management and care management and compare the dif.docx
Define case management and care management and compare the dif.docx
 
Define Bureaucracy.  Government at all levels has grown enormously, .docx
Define Bureaucracy.  Government at all levels has grown enormously, .docxDefine Bureaucracy.  Government at all levels has grown enormously, .docx
Define Bureaucracy.  Government at all levels has grown enormously, .docx
 
Define and explain how the Twitter search function works to search f.docx
Define and explain how the Twitter search function works to search f.docxDefine and explain how the Twitter search function works to search f.docx
Define and explain how the Twitter search function works to search f.docx
 
Define and relate these different terminologies and Information Gove.docx
Define and relate these different terminologies and Information Gove.docxDefine and relate these different terminologies and Information Gove.docx
Define and relate these different terminologies and Information Gove.docx
 
Define and provide examples of-Basic probability- Bayes the.docx
Define and provide examples of-Basic probability- Bayes the.docxDefine and provide examples of-Basic probability- Bayes the.docx
Define and provide examples of-Basic probability- Bayes the.docx
 
Define and discuss the phrase Manifest Destiny. Explain how this b.docx
Define and discuss the phrase Manifest Destiny. Explain how this b.docxDefine and discuss the phrase Manifest Destiny. Explain how this b.docx
Define and discuss the phrase Manifest Destiny. Explain how this b.docx
 
Define and discuss the differences between vision and mission stat.docx
Define and discuss the differences between vision and mission stat.docxDefine and discuss the differences between vision and mission stat.docx
Define and discuss the differences between vision and mission stat.docx
 
Define and discuss the four types of innovation. How might these.docx
Define and discuss the four types of innovation. How might these.docxDefine and discuss the four types of innovation. How might these.docx
Define and discuss the four types of innovation. How might these.docx
 
Define and discuss the data wiping process.Discuss how a cloud.docx
Define and discuss the data wiping process.Discuss how a cloud.docxDefine and discuss the data wiping process.Discuss how a cloud.docx
Define and discuss the data wiping process.Discuss how a cloud.docx
 

Recently uploaded

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
SoniaTolstoy
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 

Recently uploaded (20)

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 

20 questions , multiple choiceQuestion 11.Which of the fol.docx

  • 1. 20 questions , multiple choice Question 1 1. Which of the following statements is true? [removed] The Wireshark protocol analyzer has limited capabilities and is not considered multi-faceted. [removed] Wireshark is used to find anomalies in network traffic as well as to troubleshoot application performance issues. [removed] Both Wireshark and NetWitness Investigator are expensive tools that are cost-prohibitive for most organizations. [removed] NetWitness Investigator is available at no charge while Wireshark is a commercial product. 5 points Question 2 1. Wireshark capture files, like the DemoCapturepcap file found in this lab, have a __________ extension, which stands for packet capture, next generation. [removed] .packcng [removed] .paccapnextg
  • 2. [removed] .pcnextgen [removed] .pcapng 5 points Question 3 1. The Wireless Toolbar (View > Wireless Toolbar) is used only: [removed] when using a pre-captured file. [removed] when capturing live traffic. [removed] when reviewing wireless traffic. [removed] in a virtual lab environment. 5 points Question 4 1. In the frame detail pane, which of the following was a field unique to wireless traffic, confirming that it is a wireless packet? [removed] The Encapsulation type: Per-Packet Information header [removed] The Arrival time: May 11, 2007 15:30:37 041165000 Pacific
  • 3. Daylight Time [removed] The Capture Length: 181 bytes [removed] The Epoch Time: 1178922637.041165000 seconds 5 points Question 5 1. Which of the following tools provides information about the antennae signal strengths, noise ratios, and other antennae information during a captured transmission? [removed] Windows Explorer [removed] DemoCapture [removed] Wireshark [removed] NetWitness 5 points Question 6 1. Which of the following can be used to map who is able to communicate with whom, the measured strength of signals, and what frequencies are used, as well as be used for jamming certain frequencies and for determining which devices were likely used to set off remote bombs and Improvised Explosive Devices (IEDs)?
  • 4. [removed] MAC+PHY (MAC and Physical Layer) [removed] IEEE Layer [removed] Flags fields [removed] Quality of Service information 5 points Question 7 1. In the IEEE 802.11 Quality of Service information and Flags fields, Wireshark displays information about the __________, which enables the network administrator to determine which Media Access Control (MAC) addresses match each of them. [removed] antennae and signal strength [removed] transmitters and receivers of the data [removed] payload and frame information [removed] Domain System and Internet Protocol version 5 points Question 8 1.
  • 5. In the lab, Wireshark displayed the transmitter/receiver address in both full hexadecimal (00:14:a5:cd:74:7b) and a kind of shorthand, which was: [removed] IEEE 802.11. [removed] GemtekTe_IEEE. [removed] GemtekTe_00:14:a5. [removed] GemtekTe_cd:74:7b. 5 points Question 9 1. Matching the __________ to their appropriate transmitter and receiver addresses can provide the needed forensic evidence of which devices are involved in a particular communication. [removed] MAC addresses [removed] IP addresses [removed] brand names [removed] IEEE numbers 5 points Question 10
  • 6. 1. Which of the following statements is true regarding the fields displayed in Wireshark? [removed] There are hundreds of fields of data available and there are many different ways to interpret them. [removed] There are a few dozen fields of data available but there are many different ways to interpret them. [removed] There are very few fields of data available and most administrators will interpret them in the same or a similar way. [removed] Although there are very few fields of data available, most administrators will interpret them differently. 5 points Question 11 1. Which of the following is a packet capture add-on that is frequently installed with Wireshark that enables the capture of more wireless information? [removed] 3Com [removed] QoS [removed] GemtekTE
  • 7. [removed] AirPcap 5 points Question 12 1. Regardless of whether the packet is sent through the air or on a wire, the ultimate payload in an investigation is: [removed] information regarding the transmitters and receivers of the data. [removed] detail about the Internet Protocol version. [removed] a Domain Name System query. [removed] evidence of any suspicious activity. 5 points Question 13 1. In the lab, the DNS query indicated an IP address of __________ for www.polito.it. [removed] 172.30.0.100 [removed] 130.192.73.1 [removed] 177.390.13.6
  • 8. [removed] 172.30.121.1 5 points Question 14 1. What is the actual Web host name to which www.polito.it is resolved? [removed] web01.polito.gov [removed] web01.polito.it [removed] web01.polito.com [removed] www.polito.com 5 points Question 15 1. In order to use NetWitness Investigator to analyze the same packets that you analyzed with Wireshark, you first had to save the DemoCapturepcap.pcapng file in the older __________ format. [removed] .libpcap [removed] .tcpdump-libcap [removed]
  • 9. .pcapng [removed] .pcap 5 points Question 16 1. Which of the following statements is true regarding NetWitness Investigator? [removed] NetWitness Investigator is available for free so it is only used for some initial analysis. [removed] NetWitness Investigator is often used only by skilled analysts for specific types of analysis. [removed] Investigators with little training typically can capture needed information using NetWitness Investigator. [removed] Wireshark provides a more in-depth, security-focused analysis than NetWitness Investigator. 5 points Question 17 1. Which of the following statements is true regarding NetWitness Investigator reports? [removed] NetWitness reports contain only low-level wireless information,
  • 10. such as command and control. [removed] NetWitness reports do not provide the kind of sophisticated analysis that is found within Wireshark. [removed] NetWitness and Wireshark both provide the same information but the two tools differ in how that information is displayed. [removed] NetWitness is unable to provide information about the geographic location of the transmitter and receiver. 5 points Question 18 1. Which of the following tools displays the MAC address and IP address information and enables them to be correlated for a given capture transmission? [removed] DemoCapture [removed] Wireshark [removed] NetWitness Investigator [removed] Both Wireshark and NetWitness Investigator 5 points Question 19 1.
  • 11. When you were using NetWitness Investigator in the lab, the Destination City report indicated that the Destination Organization of www.polito.it was recorded as: [removed] Turin Polytechnic. [removed] Politecnico de Tourino. [removed] Republic of Italia. [removed] Turin, Italy. 5 points Question 20 1. Which of the following statements is true regarding the information in the Destination City report? [removed] The Top Level Domain (TLD) ".it" belongs to Italy. [removed] The Top Level Domain (TLD) ".it" is proofthat the Web site is physically located in Italy. [removed] The Top Level Domain (TLD) was actually registered in the United States. [removed] It indicates that it will be impossible to determine the actual physical location of the server.