11. What is the first field found in the output of a tcpdump command?

  • Version
  • Timestamp
  • Protocol
  • Source IP

12. You are using tcpdump to capture network traffic on your local computer. You would like to save the network traffic to a packet capture file for later analysis. Which tcpdump option should you use?

  • -c
  • -r
  • -w
  • -v

Weekly challenge 2

13. Fill in the blank: _____ describes the amount of data that moves across a network.

  • Traffic flow
  • Data exfiltration
  • Network traffic
  • Network data

14. What tactic do malicious actors use to maintain and expand unauthorized access into a network?

  • Exfiltration
  • Phishing
  • Data size reduction
  • Lateral movement

15. Which packet component contains protocol information?

  • Payload
  • Footer
  • Route
  • Header

16. Do packet capture files provide detailed snapshots of network communications?

  • Yes. Packet capture files provide information about network data packets that were intercepted from a network interface.
  • No. Packet capture files do not contain detailed information about network data packets.
  • Maybe. The amount of detailed information packet captures contain depends on the type of network interface that is used.

17. How do network protocol analyzers help security analysts analyze network communications? Select two answers.

  • They take action to improve network performance.
  • They provide the ability to filter and sort packet capture information to find relevant information.
  • They take action to block network intrusions.
  • They provide the ability to collect network communications.

18. Which protocol is considered the foundation for all internet communications?

  • UDP
  • IPv4
  • TCP
  • HTTP

Shuffle Q/A 2

19. What is used to determine whether errors have occurred in the IPv4 header?

  • Flags
  • Protocol
  • Checksum
  • Header

20. What is the process of breaking down packets known as?

  • Fragment Offset
  • Fragmentation
  • Flags
  • Checksum

Leave a Reply