Question: 3 . How many different source IP host addresses did you capture in your protocol captures? 4 . How many different protocols did your Wireshark
How many different source IP host addresses did you capture in your protocol captures?
How many different protocols did your Wireshark capture session have? What function in Wireshark provides you with a breakdown of the different protocol typeson the LAN segment?
How can you find Wireshark network traffic packet size counts? How and where? Are you able to distinguish how many of each packet size was transmitted on yourLAN segment? Why is this important to know?
Why is it important to use protocol capture tools and protocol analyzers as an information systems security professional?
What are some challenges to baseline analysis?
Why would an information systems security practitioner want to see network traffic on both internal and external network traffic?
Which transactions in the lab used TCP as a transport protocol? Which used UDP? Which ports were used in the lab?
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
