quiz 2

.txt

School

New York University *

*We aren’t endorsed by this school

Course

9343

Subject

Computer Science

Date

Jan 9, 2024

Type

txt

Pages

17

Uploaded by CoachPower7127

Report
1. **After installing Wireshark and initiating packet capture, what protocol will help you determine the IP address associated with a domain name like `[X].neverssl.com`?** A. TCP B. UDP C. DNS D. HTTP **Answer**: C. DNS 2. **Upon visiting a new website, which of the following processes occur first?** A. TCP Handshake B. Data Transfer C. DNS Resolution D. TLS Handshake **Answer**: C. DNS Resolution 3. **How many steps are typically involved in a complete TCP handshake?** A. 1 B. 2 C. 3 D. 4 **Answer**: C. 3 --- ### Task 2: Parsing existing pcap files 4. **Which protocol can help identify the MAC address of a host?** A. ARP B. TCP C. DNS D. ICMP **Answer**: A. ARP 5. **If you see an HTTP request to `http://345678.neverssl.com` in a pcap file, which port is most likely being used for this request?** **Answer**: 80 6. **In the context of networking, what does 'pcap' stand for?** A. Packet Capture B. Protocol Capture C. Port Capture Device D. Packet Control Access Protocol **Answer**: A. Packet Capture ---
### Task 3: Setting up SEED labs 7. **Which of the following is NOT a benefit of using DigitalOcean for setting up SEED labs?** A. Predictable cost B. Faster performance compared to all personal computers C. Easier setup process D. Familiarity of the instructors with the platform **Answer**: B. Faster performance compared to all personal computers --- ### Task 4: Prepare the network environment. 8. **Which command can be used to view the ARP table in Linux?** A. show arp B. arp -a C. display arp D. arp -n **Answer**: D. arp -n 9. **What is the primary purpose of ARP in networking?** A. Resolve domain names to IP addresses B. Establish secure connections C. Resolve IP addresses to MAC addresses D. Monitor network traffic **Answer**: C. Resolve IP addresses to MAC addresses --- ### Task 5: Intercept A’s packets from M. 10. **In the context of ARP spoofing, what does an attacker aim to do?** A. Capture all data on the network B. Send fake ARP responses to redirect traffic through them C. Establish a secure connection with the target D. Resolve IP addresses to MAC addresses **Answer**: B. Send fake ARP responses to redirect traffic through them --- ### Task 6: Implement ARP spoofing in Python 11. **The `scapy` Python package is primarily used for:** A. Web scraping B. Data analysis C. Network packet manipulation D. Establishing secure connections **Answer**: C. Network packet manipulation
### Task 1: Capturing packets on your own 12. **If you visit `https://[X].neverssl.com` instead of `http://[X].neverssl.com`, which protocol will ensure that the communication between the browser and the server is encrypted?** A. TCP B. UDP C. HTTP D. HTTPS **Answer**: D. HTTPS 13. **Which Wireshark filter can be applied to view only DNS traffic?** **Answer**: dns --- ### Task 2: Parsing existing pcap files 14. **If a packet in the pcap file shows a destination port of 53, which protocol is most likely being used?** A. FTP B. SSH C. DNS D. HTTP **Answer**: C. DNS 15. **In a packet capture, seeing a lot of duplicate ACKs may indicate what kind of network issue?** A. A fast network connection B. Packet loss or out-of-order packets C. Successful data transfer D. DNS resolution **Answer**: B. Packet loss or out-of-order packets --- ### Task 3: Setting up SEED labs 16. **Which virtualization software is not recommended for macOS with the M1 chip based on the lab instructions?** A. DigitalOcean B. VirtualBox C. UTM D. AWS **Answer**: B. VirtualBox ---
### Task 4: Prepare the network environment. 17. **If Host A pings Host B continuously and you observe the ICMP protocol in Wireshark, which message type indicates that Host B is replying to Host A's ping?** A. ICMP Request B. ICMP Reply C. ICMP Echo D. ICMP Echo Reply **Answer**: D. ICMP Echo Reply --- ### Task 5: Intercept A’s packets from M. 18. **ARP spoofing primarily exploits which layer of the OSI model?** A. Application B. Transport C. Network D. Data Link **Answer**: D. Data Link --- ### Task 6: Implement ARP spoofing in Python 19. **In ARP spoofing, which field of the ARP packet is maliciously modified by the attacker to redirect traffic?** A. Sender's MAC address B. Sender's IP address C. Target's MAC address D. Target's IP address **Answer**: A. Sender's MAC address 20. **Which Python package allows for real-time capture and interpretation of packets?** A. numpy B. requests C. scapy D. pandas **Answer**: C. scapy Absolutely! Here's an expanded list of questions for each task: --- ### Task 1: Capturing packets on your own 1. **Which tool did you use to capture the network packets?** A. Tcpdump B. Nmap
C. Wireshark D. Netstat **Answer**: C. Wireshark 2. **Upon visiting a website, which protocol is primarily used to resolve the domain name to an IP address?** **Answer**: DNS 3. **Which protocol operates at Layer 4 (Transport Layer) of the OSI model and is connection-oriented?** **Answer**: TCP 4. **What is the default port for HTTP traffic?** **Answer**: 80 5. **Which of the following is NOT an HTTP request method?** A. GET B. POST C. SEND D. PUT **Answer**: C. SEND 6. **In Wireshark, which column displays the high-level protocol type of a packet? ** **Answer**: Protocol 7. **Which status code indicates that the HTTP request has succeeded?** **Answer**: 200 OK 8. **What is the primary purpose of the neverssl.com website?** **Answer**: To force a non-SSL (HTTP) request. 9. **When analyzing packets in Wireshark, which pane provides a detailed breakdown of the selected packet?** **Answer**: The middle pane (Packet Details) 10. **Which protocol ensures secure transmission of data over a network, often represented by a padlock icon in browsers?** **Answer**: HTTPS or SSL/TLS --- ### Task 2: Parsing existing pcap files 11. **What is the file extension for Wireshark capture files?** **Answer**: .pcap
12. **In Wireshark, what is the purpose of the "Apply a Display Filter" field?** **Answer**: To filter the displayed packets based on criteria. 13. **Which of the following cannot be directly determined using a pcap file?** A. IP Address of sender B. Content of transmitted data C. Password of the sender (unless it's sent in plaintext) D. Protocol used for transmission **Answer**: C. Password of the sender (unless it's sent in plaintext) 14. **Which of the following is a potential risk when analyzing pcap files from unknown sources?** **Answer**: Malware or malicious injections 15. **If you see a three-way handshake in a pcap file, which protocol is being used?** **Answer**: TCP 16. **Which of the following best describes a "SYN flood"?** **Answer**: A type of DoS attack that sends a succession of SYN requests. 17. **What protocol uses port 443 by default?** **Answer**: HTTPS 18. **Which flag in a TCP packet indicates the termination of a connection?** **Answer**: FIN 19. **In a TCP connection, if a client sends a packet with the SYN flag set, what flag is expected in the server's response for a successful connection?** **Answer**: SYN, ACK 20. **What Wireshark filter would you use to display only DNS traffic?** **Answer**: dns Certainly! Here are questions for the remaining tasks: --- ### Task 3: Setting up SEED labs 21. **Which of the following platforms can be used to set up SEED labs?** A. AWS B. Azure C. DigitalOcean D. GCP **Answer**: C. DigitalOcean
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help