Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

NVCC ITN 263 UPDATED Exam Questions and CORRECT Answers

Rating
-
Sold
-
Pages
35
Grade
A+
Uploaded on
19-08-2024
Written in
2024/2025

NVCC ITN 263 UPDATED Exam Questions and CORRECT Answers Which of the following statements is true regarding Wireshark? - CORRECT ANSWERWireshark is probably the most widely used packet capture and analysis software in the world. The main screen of Wireshark includes several shortcuts. Which shortcut category displays a list of the network interfaces, or machines, that Wireshark has identified, and from which packets can be captured and analyzed? - CORRECT ANSWER- Capture

Show more Read less
Institution
NVCC ITN 263
Course
NVCC ITN 263

Content preview

NVCC ITN 263 UPDATED Exam
Questions and CORRECT Answers
Which of the following statements is true regarding Wireshark? - CORRECT ANSWER-
Wireshark is probably the most widely used packet capture and analysis software in the
world.


The main screen of Wireshark includes several shortcuts. Which shortcut category displays a
list of the network interfaces, or machines, that Wireshark has identified, and from which
packets can be captured and analyzed? - CORRECT ANSWER- Capture


Which of the following enables Wireshark to capture packets destined to any host on the
same subnet or virtual LAN (VLAN)? - CORRECT ANSWER- Promiscuous mode


The top pane of the Wireshark window, referred to as the __________, contains all of the
packets that Wireshark has captured, in time order, and provides a summary of the contents of
the packet in a format close to English. - CORRECT ANSWER- frame summary


The middle pane of the Wireshark window, referred to as the __________, is used to display
the packet structure and contents of fields within the packet. - CORRECT ANSWER- frame
detail


The bottom pane of the Wireshark window, referred to as the __________, displays all of the
information in the packet in hexadecimal and in decimal when possible. - CORRECT
ANSWER- data summary


Wireshark can be used in a variety of ways; however, the most common configuration for
Wireshark, and the configuration that you ran in the lab, has the software running: -
CORRECT ANSWER- on a local host


In the simplest terms, Wireshark is used to capture all packets: - CORRECT ANSWER- to
and from a computer workstation and the server.


Which of the following statements is true regarding how Wireshark works? - CORRECT
ANSWER- By running the Wireshark software on the same computer that generates the
packets, the capture is specific to that machine.

,Which of the following statements is true regarding how Wireshark handles time? -
CORRECT ANSWER- Clock time may or may not be the same as the system time of the
device or devices used to run Wireshark and capture packets.


When examining a frame header, a difference between bytes on the wire and bytes captured
can indicate that: - CORRECT ANSWER- partial or malformed packets might be captured.


In the lab, the Ethernet II detail of the provided packet capture file indicated that Wireshark
had determined that the __________ was Intel Core hardware. - CORRECT ANSWER-
source


In the lab, the Ethernet II detail of the provided packet capture file indicated that Wireshark
had determined that the __________ was Internet Protocol (IP). - CORRECT ANSWER-
type of traffic carried in the next layer


In the lab, the Ethernet II detail of the provided packet capture file indicated that Wireshark
had determined that the __________ was IPv4 multicast. - CORRECT ANSWER- destination


The __________ IP address is the IP address of the local IP host (workstation) from which
Wireshark captures packets. - CORRECT ANSWER- destination


Which of the following statements is true regarding filtering packets in Wireshark? -
CORRECT ANSWER- Filters allow a complex set of criteria to be applied to the captured
packets and only the result is displayed.


Selecting a TCP flow in the Flow Graph Analysis tool tells Wireshark that you wanted to see
all of the elements in a TCP three-way handshake, which are: - CORRECT ANSWER- SYN,
SYN-ACK, and ACK.


In the center pane of the __________, the direction of each arrow indicates the direction of
the TCP traffic, and the length of the arrow indicates between which two addresses the
interaction is taking place. - CORRECT ANSWER- Flow Graph Analysis results

,Within the frame detail pane, what does it mean when the DNS Flags detail specifies that
recursion is desired? - CORRECT ANSWER- DNS will continue to query higher level DNSs
until it is able to resolve the address.


Within the frame detail pane, the DNS Flags detail response to the query for issaseries.org
was "No such name," indicating that the: - CORRECT ANSWER- issaseries.org is not known
to any of the Domain Name Servers that were searched.


Which of the following characteristics relates to a demilitarized zone (DMZ)? - CORRECT
ANSWER- A type of perimeter network used to host resources designated as accessible by
the public from the Internet


Which of the following refers to a host on a network that supports user interaction with the
network? - CORRECT ANSWER- Client


Which of the following refers to filtering traffic as it attempts to leave a network, which can
include monitoring for spoofed addresses, malformed packets, unauthorized ports and
protocols, and blocked destinations? - CORRECT ANSWER- Egress filtering


Which of the following is the name given to unauthorized access to a system? - CORRECT
ANSWER- Backdoor


Which of the following describes caching? - CORRECT ANSWER- Retention of Internet
content by a proxy server


Which of the following characteristics relates to access control? - CORRECT ANSWER- The
process or mechanism of granting or denying use of resources; typically applied to users or
generic network traffic


Which term describes an object, computer, program, piece of data, or other logical or
physical component you use in a business process to accomplish a business task? -
CORRECT ANSWER- Asset


Which name is given to the security service of preventing access to resources by
unauthorized users while supporting access to authorized users? - CORRECT ANSWER-
Confidentiality

, Which term describes when a system is usable for its intended purpose? - CORRECT
ANSWER- Availability


Which of the following describes authentication? - CORRECT ANSWER- The process of
confirming the identity of a user


Which of the following describes a blacklist? - CORRECT ANSWER- A type of filtering in
which all activities or entities are permitted except those identified


When conducting an audit, the auditor should be which of the following? - CORRECT
ANSWER- An external person who is independent of the organization under audit


Which term is used to describe a network service that maintains a searchable index or
database of network hosts and shared resources? - CORRECT ANSWER- Directory Service


Which of the following refers to a form of attack that attempts to compromise availability? -
CORRECT ANSWER- Denial of service (DoS)


Which term describes a network device that forwards traffic between networks based on the
MAC address of the Ethernet frame? - CORRECT ANSWER- bridge


Which of the following refers to a software firewall installed on a client or server? -
CORRECT ANSWER- Host firewall


Which of the following refers to a type of software product that is pre-compiled and whose
source code is undisclosed? - CORRECT ANSWER- closed source


Which term describes the cumulative value of an asset based on both tangible and intangible
values? - CORRECT ANSWER- asset value (AV)


Which malicious software program is distributed by hackers to take control of victims'
computers? - CORRECT ANSWER- Bots

Written for

Institution
NVCC ITN 263
Course
NVCC ITN 263

Document information

Uploaded on
August 19, 2024
Number of pages
35
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$10.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
MGRADES Stanford University
Follow You need to be logged in order to follow users or courses
Sold
1373
Member since
2 year
Number of followers
103
Documents
84393
Last sold
8 hours ago
MGRADES (Genius Brains)

Welcome to MGRADES Exams, practices and Study materials The work speaks for itself Me and my team will always make sure you get the best value from the exams markets. I offer the best study and exam materials for a wide range of courses and units. Make your study sessions more efficient and effective. Dive in and discover all you need to excel in your academic journey!

3.8

230 reviews

5
94
4
50
3
51
2
14
1
21

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions