Questions
Now it's time to check your knowledge. Select the best response and then check your answers, which can be found in the Assessments appendix:
- Packet analysis has been around in some form since the _____ as a diagnostic tool to observe data and other information traveling across the network.
- 1950s
- 1960s
- 1970s
- 1990s
- Packet analysis is used in the real world in many forms. One is the DHS _____system, which monitors for threats.
- CARVER
- Packet
- EINSTEIN
- DESTINY3
- In the expert system, _____ provides information about typical workflows such as TCP window updates or connection finishes.
- Note
- Chat
- Error
- Warn
- A ____ provides a snapshot of network traffic during a window of time using Wireshark or
tshark
. Characteristics can include utilization, network protocols, and effective throughput forwarding rates.- Round Robin
- DORA process
- Baseline
- WinCheck
- Monitoring for threats occurs in one of three ways. _____ is when a system has fallen victim to an attack and the incident response team manages the attack, followed by a forensic exercise.
- Proactive
- Reactive
- Active
- Redactive
- When testing _____ using Wireshark, you will be able to determine how they communicate once active and see whether they phone home without being prompted.
- ACLs
- Expert systems
- IoT devices
- IDSes
- When obtaining an IP address, DHCP will go through a four-part transaction called the _____.
- Round Robin
- DORA process
- Baseline
- WinCheck