quiz 2
.txt
keyboard_arrow_up
School
New York University *
*We aren’t endorsed by this school
Course
9343
Subject
Computer Science
Date
Jan 9, 2024
Type
txt
Pages
17
Uploaded by CoachPower7127
1. **After installing Wireshark and initiating packet capture, what protocol will help you determine the IP address associated with a domain name like `[X].neverssl.com`?**
A. TCP B. UDP C. DNS D. HTTP
**Answer**: C. DNS
2. **Upon visiting a new website, which of the following processes occur first?**
A. TCP Handshake B. Data Transfer C. DNS Resolution D. TLS Handshake
**Answer**: C. DNS Resolution
3. **How many steps are typically involved in a complete TCP handshake?**
A. 1 B. 2 C. 3 D. 4
**Answer**: C. 3
---
### Task 2: Parsing existing pcap files
4. **Which protocol can help identify the MAC address of a host?**
A. ARP B. TCP C. DNS D. ICMP
**Answer**: A. ARP
5. **If you see an HTTP request to `http://345678.neverssl.com` in a pcap file, which port is most likely being used for this request?**
**Answer**: 80
6. **In the context of networking, what does 'pcap' stand for?**
A. Packet Capture B. Protocol Capture C. Port Capture Device D. Packet Control Access Protocol
**Answer**: A. Packet Capture
---
### Task 3: Setting up SEED labs 7. **Which of the following is NOT a benefit of using DigitalOcean for setting up SEED labs?**
A. Predictable cost B. Faster performance compared to all personal computers C. Easier setup process D. Familiarity of the instructors with the platform
**Answer**: B. Faster performance compared to all personal computers
---
### Task 4: Prepare the network environment.
8. **Which command can be used to view the ARP table in Linux?**
A. show arp B. arp -a C. display arp D. arp -n
**Answer**: D. arp -n
9. **What is the primary purpose of ARP in networking?**
A. Resolve domain names to IP addresses B. Establish secure connections C. Resolve IP addresses to MAC addresses D. Monitor network traffic
**Answer**: C. Resolve IP addresses to MAC addresses
---
### Task 5: Intercept A’s packets from M.
10. **In the context of ARP spoofing, what does an attacker aim to do?**
A. Capture all data on the network B. Send fake ARP responses to redirect traffic through them C. Establish a secure connection with the target D. Resolve IP addresses to MAC addresses
**Answer**: B. Send fake ARP responses to redirect traffic through them
---
### Task 6: Implement ARP spoofing in Python
11. **The `scapy` Python package is primarily used for:**
A. Web scraping B. Data analysis C. Network packet manipulation D. Establishing secure connections
**Answer**: C. Network packet manipulation
### Task 1: Capturing packets on your own
12. **If you visit `https://[X].neverssl.com` instead of `http://[X].neverssl.com`,
which protocol will ensure that the communication between the browser and the server is encrypted?**
A. TCP B. UDP C. HTTP D. HTTPS
**Answer**: D. HTTPS
13. **Which Wireshark filter can be applied to view only DNS traffic?**
**Answer**: dns
---
### Task 2: Parsing existing pcap files
14. **If a packet in the pcap file shows a destination port of 53, which protocol is most likely being used?**
A. FTP B. SSH C. DNS D. HTTP
**Answer**: C. DNS
15. **In a packet capture, seeing a lot of duplicate ACKs may indicate what kind of
network issue?**
A. A fast network connection B. Packet loss or out-of-order packets C. Successful data transfer D. DNS resolution
**Answer**: B. Packet loss or out-of-order packets
---
### Task 3: Setting up SEED labs 16. **Which virtualization software is not recommended for macOS with the M1 chip based on the lab instructions?**
A. DigitalOcean B. VirtualBox C. UTM D. AWS
**Answer**: B. VirtualBox
---
### Task 4: Prepare the network environment.
17. **If Host A pings Host B continuously and you observe the ICMP protocol in Wireshark, which message type indicates that Host B is replying to Host A's ping?**
A. ICMP Request B. ICMP Reply C. ICMP Echo D. ICMP Echo Reply
**Answer**: D. ICMP Echo Reply
---
### Task 5: Intercept A’s packets from M.
18. **ARP spoofing primarily exploits which layer of the OSI model?**
A. Application B. Transport C. Network D. Data Link
**Answer**: D. Data Link
---
### Task 6: Implement ARP spoofing in Python
19. **In ARP spoofing, which field of the ARP packet is maliciously modified by the
attacker to redirect traffic?**
A. Sender's MAC address B. Sender's IP address C. Target's MAC address D. Target's IP address
**Answer**: A. Sender's MAC address
20. **Which Python package allows for real-time capture and interpretation of packets?**
A. numpy B. requests C. scapy D. pandas
**Answer**: C. scapy
Absolutely! Here's an expanded list of questions for each task:
---
### Task 1: Capturing packets on your own
1. **Which tool did you use to capture the network packets?**
A. Tcpdump B. Nmap
C. Wireshark D. Netstat
**Answer**: C. Wireshark
2. **Upon visiting a website, which protocol is primarily used to resolve the domain name to an IP address?**
**Answer**: DNS
3. **Which protocol operates at Layer 4 (Transport Layer) of the OSI model and is connection-oriented?**
**Answer**: TCP
4. **What is the default port for HTTP traffic?**
**Answer**: 80
5. **Which of the following is NOT an HTTP request method?**
A. GET B. POST C. SEND D. PUT
**Answer**: C. SEND
6. **In Wireshark, which column displays the high-level protocol type of a packet?
**
**Answer**: Protocol
7. **Which status code indicates that the HTTP request has succeeded?**
**Answer**: 200 OK
8. **What is the primary purpose of the neverssl.com website?**
**Answer**: To force a non-SSL (HTTP) request.
9. **When analyzing packets in Wireshark, which pane provides a detailed breakdown of the selected packet?**
**Answer**: The middle pane (Packet Details)
10. **Which protocol ensures secure transmission of data over a network, often represented by a padlock icon in browsers?**
**Answer**: HTTPS or SSL/TLS
---
### Task 2: Parsing existing pcap files
11. **What is the file extension for Wireshark capture files?**
**Answer**: .pcap
12. **In Wireshark, what is the purpose of the "Apply a Display Filter" field?**
**Answer**: To filter the displayed packets based on criteria.
13. **Which of the following cannot be directly determined using a pcap file?**
A. IP Address of sender B. Content of transmitted data C. Password of the sender (unless it's sent in plaintext) D. Protocol used for transmission
**Answer**: C. Password of the sender (unless it's sent in plaintext)
14. **Which of the following is a potential risk when analyzing pcap files from unknown sources?**
**Answer**: Malware or malicious injections
15. **If you see a three-way handshake in a pcap file, which protocol is being used?**
**Answer**: TCP
16. **Which of the following best describes a "SYN flood"?**
**Answer**: A type of DoS attack that sends a succession of SYN requests.
17. **What protocol uses port 443 by default?**
**Answer**: HTTPS
18. **Which flag in a TCP packet indicates the termination of a connection?**
**Answer**: FIN
19. **In a TCP connection, if a client sends a packet with the SYN flag set, what flag is expected in the server's response for a successful connection?**
**Answer**: SYN, ACK
20. **What Wireshark filter would you use to display only DNS traffic?**
**Answer**: dns
Certainly! Here are questions for the remaining tasks:
---
### Task 3: Setting up SEED labs
21. **Which of the following platforms can be used to set up SEED labs?**
A. AWS B. Azure C. DigitalOcean D. GCP
**Answer**: C. DigitalOcean
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Every email client's support for different protocols is visible to the mail server.Email sending and receiving is made possible using IMAP.a. SMTP:TCP and POP, respectively
arrow_forward
A network system has 5 protocol layers. Applications generate messages of length M bytes. At each of the layers, an h-byte header is added. What fraction of the network bandwidth is filled with messages?
Select one:
a. 5h/(5h+M)
b. M/(5h+M)
c. M/(4h+M)
d. 4h/(4h+M)
arrow_forward
A network system has 4 protocol layers. Applications generate messages of length M bytes. At each of the layers, an h-byte header is added. What fraction of the network bandwidth is filled with headers?
Select one:
a.
3h/(3h+M)
b. M/(3h+M)
c. M/(4h+M)
d. 4h/(4h+M)
arrow_forward
A network system has 5 protocol layers. Applications generate messages of length M bytes. At each of the layers, an h-byte header is added. What fraction of the network bandwidth is filled with headers?
a. 5h/(5h+M)
b. M/(5h+M)
c. M/(4h+M)
d. 4h/(4h+M)
arrow_forward
TRUE or FALSE? When a message is broken into packets for transmission over the Internet, it is guaranteed that all packets will take the same route from source to destination.
arrow_forward
FTP stands for File transfer protocol.
FTP is a standard internet protocol provided by TCP/IP used for transmitting the files from one host to another.
It is mainly used for transferring the web page files from their creator to the computer that acts as a server for other computers on the internet.
It is also used for downloading the files to computer from other servers.
What is the difference between active and passive FTP that makes stateful packet
filtering a good idea?
arrow_forward
IPV4 is a Connection oriented
Protocol. *
False
True
Broadcast is the process of
sending a packet from one host
to a selected group of hosts. *
False
True
The prefix length is the number
of bits in the address that gives
the Host portion. "
False
True
The metric is used to decide
which route appears on the
routing table. *
True
False
The throughput value is greater
than The Bandwidth Value. *
True
False
O O
O O
arrow_forward
Consider the IPv4 address 135.222.125.23/23
What is the network mask in dotted decimal notation?
How many bits belong to the host ID?
How many addresses are in this IP address block?
What is the FIRST IP address of this block?
What is the LAST IP address of this block?
arrow_forward
Classify each of the following as a property of TCP or UDP protocols
No. Property
protocol
1 It continues sending even if pieces of the message are lost
or few errors have shown in the transmitted message
2 It is ideal for the online video streaming communications
3 It forces the sender and the receiver to establish a
communication connection before the communication
4 It is ideal for the online gaming
5 It contain a lot of overhead data
6 The data will be directly sent to the receiver even if the
receiver is off or down
7 If there is an error then it requests the sender to
retransmit
8 It is ideal for the communications between users and
business institutions like the banks
arrow_forward
19- Which ones are true about TCP & UDP?
A-UDP has guaranteed transmission.
B-TCP is slower than UDP.
C-TCP is a secure protocol UDP is not secure.
D-There is no error checking mechanism in UDP.
E-TCP has 8 bits header.
20- Default network mask for Class B IPv4 address is ....
A-255.0.0.0
B-255.255.255.0
D-None of Them
E-255.255.255.255
21-MAC Address is ... Bits Long.
A-24
D-48
B-64
E-32
C-255.255.0.0
C-128
arrow_forward
Q6:
Suppose a computer sends a packet at the network layer to another computer
somewhere in the Internet. The logical destination address of the packet is cor-
rupted. What happens to the packet? How can the source computer be informed of
the situation?
arrow_forward
Suppose a user from Taman Jatt Kata Kinabalu is working from a machine at home with IP address 10. 0. 0.10 on a local network attached to a router connected to the Internet The user requests a web page through a Web browser. Show using illustration when and why each of the following aspects of networking are involved. Be as precise as possible.
i ARP
ii NAT
iii DNS
iv UDP
v TCP.
arrow_forward
Suppose a user has a webserver running at a machine with the name www.nadir.edu.net.pk and IP address 10.10.10.10. The authoritative dns address for this web server is with the name dns.nadir.edu.net.pk and with IP address 11.11.11.11.
a. Write all the steps involved in inserting this webserver name in the DNS hierarchy.
b. Write all the steps involved in retrieving the IP address of www.nadir.edu.net.pk
arrow_forward
1.The Intra-Site Automatic Tunnel Addressing Protocol is used to transmit IPv6 packets between dual IP layer hosts across an IPv4 network.True or false
2. ICMP is a Network-layer protocol the ping program uses to test whether a computer can communicate with another computer.true or false
3.Addresses starting with fe80 are called link-local IPv6 addresses.true or false
4Routing packets is the key responsibility of the TCP protocol.true or false
5.A zone id is used to distinguish which interface an IPv6 unique local IPv6 address is bound to.true or false
arrow_forward
Suppose a user has a webserver running at a machine with the name nadir.edu.net.pk and IP address 10.10.10.10. The authoritative DNS address for this web server is with the name dns.nadir.edu.net.pk and with IP address 11.11.11.11.
Write all the steps involved in retrieving the IP address of nadir.edu.net.pk
arrow_forward
Suppose a user has a webserver running at a machine with the name nadir.edu.net.pk and IP address 10.10.10.10. The authoritative DNS address for this web server is with the name dns.nadir.edu.net.pk and with IP address 11.11.11.11.
Write all the steps involved in inserting this web server name in the DNS hierarchy.
arrow_forward
1. Whihc protocol is used to securely interconnect network devices?
O A: TCP
OB: IPSEC
C: L2TP
D: PPTP
O E: IP/VPN
OF: IEEE802.1X
2. Which statment is true about the TCP 3 way-handshake (initiated by the host, and answered by a server)?
O A: The server sends back the acknowledge as a SYN message with the same sequence number as it was received from the host.
OB: The server sends back the acknowledge as a SYN message with the same sequence number as received.
O C: The host always start the sequence numbering from 1024.
OD: The server sends back the acknowledge as a SYN message with a random number as sequence ID.
O E: Both the SYN-ACK and ACK messages uses a sequence number which is higher with one than the received one. (eg. if the received is 1024, then the ack is 1025)
OF: Both SYN and SYN-ACK use random sequence number
OG: None of above
arrow_forward
Given an IP Block 10.10.1.0/24 write the 1st 10 subnets NA, and BA if the number of host is 14.
NA
BA
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Comptia A+ Core 1 Exam: Guide To Computing Infras...
Computer Science
ISBN:9780357108376
Author:Jean Andrews, Joy Dark, Jill West
Publisher:Cengage Learning
A+ Guide To It Technical Support
Computer Science
ISBN:9780357108291
Author:ANDREWS, Jean.
Publisher:Cengage,
A+ Guide to Hardware (Standalone Book) (MindTap C...
Computer Science
ISBN:9781305266452
Author:Jean Andrews
Publisher:Cengage Learning
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
LINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.
Computer Science
ISBN:9781337569798
Author:ECKERT
Publisher:CENGAGE L
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning
Related Questions
- Every email client's support for different protocols is visible to the mail server.Email sending and receiving is made possible using IMAP.a. SMTP:TCP and POP, respectivelyarrow_forwardA network system has 5 protocol layers. Applications generate messages of length M bytes. At each of the layers, an h-byte header is added. What fraction of the network bandwidth is filled with messages? Select one: a. 5h/(5h+M) b. M/(5h+M) c. M/(4h+M) d. 4h/(4h+M)arrow_forwardA network system has 4 protocol layers. Applications generate messages of length M bytes. At each of the layers, an h-byte header is added. What fraction of the network bandwidth is filled with headers? Select one: a. 3h/(3h+M) b. M/(3h+M) c. M/(4h+M) d. 4h/(4h+M)arrow_forward
- A network system has 5 protocol layers. Applications generate messages of length M bytes. At each of the layers, an h-byte header is added. What fraction of the network bandwidth is filled with headers? a. 5h/(5h+M) b. M/(5h+M) c. M/(4h+M) d. 4h/(4h+M)arrow_forwardTRUE or FALSE? When a message is broken into packets for transmission over the Internet, it is guaranteed that all packets will take the same route from source to destination.arrow_forwardFTP stands for File transfer protocol. FTP is a standard internet protocol provided by TCP/IP used for transmitting the files from one host to another. It is mainly used for transferring the web page files from their creator to the computer that acts as a server for other computers on the internet. It is also used for downloading the files to computer from other servers. What is the difference between active and passive FTP that makes stateful packet filtering a good idea?arrow_forward
- IPV4 is a Connection oriented Protocol. * False True Broadcast is the process of sending a packet from one host to a selected group of hosts. * False True The prefix length is the number of bits in the address that gives the Host portion. " False True The metric is used to decide which route appears on the routing table. * True False The throughput value is greater than The Bandwidth Value. * True False O O O Oarrow_forwardConsider the IPv4 address 135.222.125.23/23 What is the network mask in dotted decimal notation? How many bits belong to the host ID? How many addresses are in this IP address block? What is the FIRST IP address of this block? What is the LAST IP address of this block?arrow_forwardClassify each of the following as a property of TCP or UDP protocols No. Property protocol 1 It continues sending even if pieces of the message are lost or few errors have shown in the transmitted message 2 It is ideal for the online video streaming communications 3 It forces the sender and the receiver to establish a communication connection before the communication 4 It is ideal for the online gaming 5 It contain a lot of overhead data 6 The data will be directly sent to the receiver even if the receiver is off or down 7 If there is an error then it requests the sender to retransmit 8 It is ideal for the communications between users and business institutions like the banksarrow_forward
- 19- Which ones are true about TCP & UDP? A-UDP has guaranteed transmission. B-TCP is slower than UDP. C-TCP is a secure protocol UDP is not secure. D-There is no error checking mechanism in UDP. E-TCP has 8 bits header. 20- Default network mask for Class B IPv4 address is .... A-255.0.0.0 B-255.255.255.0 D-None of Them E-255.255.255.255 21-MAC Address is ... Bits Long. A-24 D-48 B-64 E-32 C-255.255.0.0 C-128arrow_forwardQ6: Suppose a computer sends a packet at the network layer to another computer somewhere in the Internet. The logical destination address of the packet is cor- rupted. What happens to the packet? How can the source computer be informed of the situation?arrow_forwardSuppose a user from Taman Jatt Kata Kinabalu is working from a machine at home with IP address 10. 0. 0.10 on a local network attached to a router connected to the Internet The user requests a web page through a Web browser. Show using illustration when and why each of the following aspects of networking are involved. Be as precise as possible. i ARP ii NAT iii DNS iv UDP v TCP.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Comptia A+ Core 1 Exam: Guide To Computing Infras...Computer ScienceISBN:9780357108376Author:Jean Andrews, Joy Dark, Jill WestPublisher:Cengage LearningA+ Guide To It Technical SupportComputer ScienceISBN:9780357108291Author:ANDREWS, Jean.Publisher:Cengage,A+ Guide to Hardware (Standalone Book) (MindTap C...Computer ScienceISBN:9781305266452Author:Jean AndrewsPublisher:Cengage Learning
- Principles of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage LearningLINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.Computer ScienceISBN:9781337569798Author:ECKERTPublisher:CENGAGE LSystems ArchitectureComputer ScienceISBN:9781305080195Author:Stephen D. BurdPublisher:Cengage Learning
Comptia A+ Core 1 Exam: Guide To Computing Infras...
Computer Science
ISBN:9780357108376
Author:Jean Andrews, Joy Dark, Jill West
Publisher:Cengage Learning
A+ Guide To It Technical Support
Computer Science
ISBN:9780357108291
Author:ANDREWS, Jean.
Publisher:Cengage,
A+ Guide to Hardware (Standalone Book) (MindTap C...
Computer Science
ISBN:9781305266452
Author:Jean Andrews
Publisher:Cengage Learning
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
LINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.
Computer Science
ISBN:9781337569798
Author:ECKERT
Publisher:CENGAGE L
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning