What tools did you utilize during your investigation

Assignment Help Computer Networking
Reference no: EM133280269

Questions

1. What network adapter did you utilize to run Wireshark on?

2. What website did you navigate to? Any sub domains?

3. What data did you find?

4. Did you find a way to filter by protocol?

5. What protocol stream did you follow?

6. What information was found in the data that you chose to investigate?

7. What tools did you utilize during your investigation?

8. What was discovered about the information?

9. What type of file or extension is created when saving the packet capture?

10. What have you learned from this assignment if you are not already familiar with Wireshark?

Reference no: EM133280269

Questions Cloud

Solution to synchronization problem : Which of the following is NOT a solution to the synchronization problem when sending a message to a remote computer?
Integrity verification : Consider CBC to provide confidentiality and CBC-Residue to provide integrity verification where we use one key K1 to generate CBC encryption of given plaintext
Network indicating the means of communication : It must show the topology of the Network indicating the means of communication and the link with the remote Data Server (WAN), taking into account
Assembling the data field in original datagram : Consider that the IP entity creates a buffer for assembling the data field in the original datagram.
What tools did you utilize during your investigation : What network adapter did you utilize to run Wireshark on? What tools did you utilize during your investigation? What was discovered about the information?
Subnet compared with the individual host scans : What can you say about the results when scanning multiple hosts and/or a subnet compared with the individual host scans?
Types of access network are del network and cable network : Two common types of access network are DEL network and cable network.
Date and time settings : You notice that the date and time are incorrect. You correct the date and time settings, continue using your computer
Photo editing software to remove red eye : You are using photo editing software to remove red eye from a photo. What might be causing this?

Reviews

Write a Review

Computer Networking Questions & Answers

  Computing higher data rate than atm line

Suppose that you have trained your dog to carry box of three data storage tapes. For what range of distances does dog have higher data rate than 155 Mbps ATM line ?

  An application-level and a circuit-level one

What is a gateway, and what is the difference between an application-level and a circuit-level one?

  Draw the messages and the packets they would contain

Suppose the employee connects to the ISP using a layer-2 protocol called XYZ. What packets would be in the message from the employes's router to the ISP.

  Main categories of information assets

Assess the information security situation in a small business eg. a restaurant and make recommendations for improvements.

  Analyze the result obtained regarding http page response

Analyze the result we obtained regarding the HTTP page response time. Collect four other statistics, of your choice, and rerun the simulation of the Simple and the Busy network scenarios.

  How you would propose protecting your chosen cloud solution

How you would propose protecting your chosen cloud solution from cyber-attack using current password and data protection protocol. Why and how the use of social media can ensure your company has a competitive edge.

  Try to solve the problem using the simple hebb network

Apply the extended Hebb network procedure, written in the previous exercise to realize the Boolean functions AND and OR, as illustrated in Figure.

  Case study on ping sweeps and port scans

Your boss has just heard about some nefarious computer activities called ping sweeps and port scans. He wants to know more about them and what their impact might be on the company. Write a brief description of what they are, and include your asses..

  Provide a scenario for using point to point topology

In this paper, (a) define each topology, (b) provide a scenario for using each topology, and (c) identify at least one disadvantage of using each topology.

  Explain the end-to-end process of how voip works

Briefly describe each of the listed vulnerability, along with a possible recommendation for a countermeasure..

  Government emergency management agencies

Throughout the history of emergency management in the United States, priorities set for government emergency management agencies

  How many bytes of option are included in the segment

If the value of HLEN is 0111, how many bytes of option are included in the segment? Choose an appropriate ephemeral port number.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd