What was the ip address for lanswitchone

Assignment Help Computer Engineering
Reference no: EM131152988

Lab- Performing Packet Capture and Traffic Analysis

Overview

In this lab, you used common applications to generate traffic and transfer files between the machines in this lab. You captured data using Wireshark and reviewed the captured traffic at the packet level, and then you used NetWitness Investigator, a free tool that provides security practitioners with a means of analyzing a complete packet capture, to review the same traffic at a consolidated level.

Lab Assessment Questions & Answers

1. Why would a network administrator use Wireshark and NetWitness Investigator together?

2. What was the IP address for LanSwitch1?

3. When the 172.16.8.5 IP host responded to the ICMP echo-requests, how many ICMP echo-reply packets were sent back to the vWorkstation?

4. What was the terminal password for LanSwitch 1 and LanSwitch 2?

5. When using SSH to remotely access a Cisco router, can you see the terminal password? Why or why not?

6. What were the Destination IP addresses discovered by the NetWitness Investigator analysis?

7. Are packet-capturing tools like Wireshark less dangerous on switched LANs?

Reference no: EM131152988

Questions Cloud

Explain what is the purpose of the business impact analysis : What is the purpose of the business impact analysis (BIA)? What is the difference between a disaster recovery plan (DRP) and a business continuity plan (BCP)?
Evidence to doubt the distributor reported average : One of your distributors reports an average of 175 sales per day. You suspect that the average is different from 175, so you select 42 days and determine the number of sales each day. The sample mean is 166 with a standard deviation of 20 sales. A..
What major themes will be discussing in your critical review : Please provide one paragraph that introduces the book. In your introduction, provide a brief discussion regarding what you thought about the book. You should end the introduction with an outline detailing what you intend to focus on in your book ..
Resting heart rates for a sample of individuals : Assume the resting heart rates for a sample of individuals are normally distributed with a mean of 80 and a standard deviation of 5. Use the 68-95-99.7 rule to find the following quantities.
What was the ip address for lanswitchone : What was the IP address for LanSwitch1? When the 172.16.8.5 IP host responded to the ICMP echo-requests, how many ICMP echo-reply packets were sent back to the vWorkstation?
Commands will yield the correct answer : Energizer batteries are considered to be very reliable. Only 0.5% of batteries produced are defective. A purchaser would like to know the probability that more than 100 batteries are defective out of a shipment of 20,000 batteries. Which of the fo..
Explain the importance of situating a society cultural : Explain how key social, cultural, and artistic contributions contribute to historical changes. Explain the importance of situating a society's cultural and artistic expressions within a historical context.
Name six policies you could enable in a windows domain : Name six policies you could enable in a Windows Domain. What is the minimum password length enforced by the Password must meet complexity requirements policy?
Sales between the two seasons : The mean sales during the winter months was $995 with a standard deviation of $100. At 0.02 significance level can we conclude there is a difference in sales between the two seasons? Find the p value

Reviews

Write a Review

Computer Engineering Questions & Answers

  The difference between subnetting and supernetting

give the importance of subnetting with respect to collisions, broadcasts and controlling traffic. Discuss the difference between subnetting and supernetting.

  Is filename generation happen on variable assignment

Will the following command always rightly loop through each of the positional parameters?

  How converting between different data system

I would like to know how I can convert from signed binary numbers to decimal values, from decimal numbers to signed magnitude, 2's complement, and short floating point format. Also, it would be better to provide examples with positive and negative..

  1 consider the one time pad encryption scheme to encrypt a

1. consider the one time pad encryption scheme to encrypt a 1-bit message. replace the xor operation with another

  Explain how is the process that you followed similar to or

describe the steps you have taken to maintain and redesign your site over the past several weeks. how is the process

  What is the data rate

What is the data rate

  Execute a class person with two fields name and age

Execute a class Person with two fields name and age.

  Create an xml­ specific class diagram

Reduce the class diagram to those classes and attributes, associations and cardinalities required by the scenario. Justify for every element of the class diagram your decision to keep or drop it, always referring to the requirements of the scenari..

  Questionphysical layer is only concerned with transmission

questionphysical layer is only concerned with transmission of a series of bits from one point to another. assume that

  Write down a program using the vector class

create a program using vector class that allows the user to input the number of days worked in a 7 day workweek and, using a fixed hourly rate, calculates the weeks wages and the average number of hours worked per day.

  Cloud to provide crm installations

What "Cloud" can provide to the CRM installations in order to ease the adoption of such systems?

  What strategic competitive benefits do you see in a

what strategic competitive benefits do you see in a companys use of extranets? explain your position and provide

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd