Why is it important to select student interface in wireshark

Assignment Help Computer Networking
Reference no: EM131188380

Lab: Performing Reconnaissance and Probing Using Common Tools

Overview

In this lab, you explored the common tools available in the virtual lab environment. You used Wireshark to capture and analyze network traffic and OpenVAS to scan the network. You reviewed a sample collection of data using NetWitness Investigator, connected to a remote Windows machine, and explored two file transfer applications, FileZilla and Tftpd64. You used PuTTY to connect to a Linux machine and ran several Cisco commands to display statistics for the network interfaces. Finally, you used Zenmap to perform a scan of the network and created a network topology chart.

Lab Assessment Questions & Answers

1. Name at least five applications and tools used in the lab.

2. What is promiscuous mode?

3. How does Wireshark differ from NetWitness Investigator?

4. Why is it important to select the student interface in the Wireshark?

5. What is the command line syntax for running an Intense Scan with Zenmap on a target subnet of 172.30.0.0/24?

6. Name at least five different scans that may be performed with Zenmap.

7. How many different tests (i.e., scripts) did your Intense Scan perform?

8. Based on your interpretation of the Intense Scan, describe the purpose/results of each tests script performed during the report.

9. How many total IP hosts did Zenmap find on the network?

Reference no: EM131188380

Questions Cloud

What is the payback period of this investment : You are considering making a movie. The movie is expected to cost $100 million upfront and takes a year to make. After that, it is expected to make $83 million in the first year it is released and $5 million for the following 20 years. Your cost of c..
Reduced as a result of the tax loss carryforward : Assume that Citrus Corporation is considering the acquisition of Orange Juice, Inc. The latter has a $500,000 tax loss carryforward. How much will the total taxes of Citrus Corporation be reduced as a result of the tax loss carryforward?
What is the major difference between zenmap and openvas : What is the major difference between Zenmap and OpenVAS? Why do you need to run both tools like Zenmap and OpenVAS to complete the reconnaissance phase of the ethical hacking process?
Regard to the execution of many compensation plans : Define agency cost and explain why firms incur them. How can management structure management compensation to minimise agency problems? What is the current view with regard to the execution of many compensation plans?
Why is it important to select student interface in wireshark : How does Wireshark differ from NetWitness Investigator? Why is it important to select the student interface in the Wireshark? What is the command line syntax for running an Intense Scan with Zenmap on a target subnet of 172.30.0.0/24?
Implement the pong game : CAB202 Assignment: Pong. Your task is to implement the Pong game. Throughout the semester, you have been provided with a number of examples of skeleton code for implementing games with the CAB202 ZDK library
What is the principal balance on the loan after one year : Suppose you are able to borrow funds with a 3-year loan with monthly loan payments to finance the capital investment. The bank has agreed to a interest rate matching the appropriate discount rate on the project(or projects). Prepare a loan amortizati..
Managing business ethics : (Managing Business Ethics: Straight Talk About How To Do It Right, 6th edition), the authors assert their 'firm' belief "that business isn't just 'better' when companies and business people are ethical, but rather that good ethics is absolutely essen..

Reviews

Write a Review

Computer Networking Questions & Answers

  Discuss some of the problems nats create for ipsec security

discuss some of the problems nats create for ipsec security. see phifer 2000. can we solve these problems by using

  Explain the business case for cloud computing why would an

cloud computing provides many new capabilities that large and small organizations find very attractive. the problem is

  Maintaining current employers connection to internet

Assume you are responsible for selecting and maintaining your current employers connection to the Internet. Take some time to research routing protocols

  How web caching can reduce delay in receiving object

Describe how Web caching can reduce the delay in receiving a requested object. Will Web caching reduce the delay for all objects requested by a user

  Determine percentage of ip datagram will be overhead

Determine percentage of each IP datagram will be overhead and percentage will be application data? Illustrate all computations required.

  Consider a situation where two microcontroller

Consider a situation where two microcontrollers are connected with a CAN network. Computer 1 generates 8-bit data packets that must be sent to Computer 2, and Computer 2 generates 8-bit data packets that must be sent to Computer 1

  Explain the benefits of server-side software

Explain the benefits of server-side software and how it give mobile users with access to particular kinds of communications and information.

  Research and recommend writing guide-forensics organization

Your manager has asked you to research and recommend a writing guide that examiners in your computer forensics organization will use for all official written reports.

  Identifying potential malicious attacks threats and

identifying potential malicious attacks threats and vulnerabilitiesyou have just been hired as an information security

  Write the assessment for riordan manufacturing

Write the assessment for Riordan Manufacturing using the service request SR-rm-011 Adding Wireless to the WAN found in the Virtual Organizations.

  Determine about the crash if rip and ospf is used

Large wide area network covers United States and has multiple nodes in evey state. Node in Denver crashes completely. How do other nodes in the country determine about the crash if RIP is used? If OSPF is used?

  Open systems interconnection (osi) protocol mode

Describe the Open Systems Interconnection (OSI) protocol model.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd