- Packet classification
- Packet crafting
- Data leak
- Data exfiltration
Q: What tactic do malicious actors use to maintain and expand
unauthorized access into a network?
- Exfiltration
- Data size reduction
- Lateral movement
- Phishing
Q: Which packet component contains protocol information?
- Route
- Header
- Payload
- Footer
Q: The practice of capturing and inspecting network data packets that
are transmitted across a network is known as _____.
- port sniffing
- packet sniffing
- packet capture
- protocol capture
Q: Network protocol analyzer tools are available to be used with which
of the following? Select two answers.
- Internet protocol
- Graphical user interface
- Command-line interface
- Network interface card
Q: Which layer of the TCP/IP model is responsible for accepting and
delivering packets in a network?
- Network Access
- Application
- Internet
- Transport
Q: What is used to determine whether errors have occurred in the IPv4
header?
- Protocol
- Flags
- Checksum
- Header
Q: Which tcpdump option applies verbosity?
- -i
- -c
- -n
- -v
Q: Examine the following tcpdump output:
22:00:19.538395 IP (tos 0x10, ttl 64, id 33842, offset 0, flags [P],
proto TCP (6), length 196) 198.168.105.1.41012 > 198.111.123.1.61012: Flags
[P.], cksum 0x50af (correct), seq 169, ack 187, win 501, length 42
What is the source IP address?
- 41012
- 198.168.105.1
- 22:00:19.538395
- 198.111.123.1
Q: Fill in the blank: _____ describes the amount of data that moves
across a network.
- Network data
- Data exfiltration
- Network traffic
- Traffic flow
Q: Which of the following behaviors may suggest an ongoing data
exfiltration attack? Select two answers.
- Network performance issues
- Multiple successful multi-factor authentication logins
- Unexpected modifications to files containing sensitive data
- Outbound network traffic to an unauthorized file hosting service
Q: Do packet capture files provide detailed snapshots of network
communications?
- Yes. Packet capture files provide information about network data packets that were intercepted from a network interface.
- No. Packet capture files do not contain detailed information about network data packets.
- Maybe. The amount of detailed information packet captures contain depends on the type of network interface that is used.
Q: Fill in the blank: tcpdump is a network protocol analyzer that uses
a(n) _____ interface.
- Linux
- graphical user
- command-line
- internet
Q: Which IPv4 field determines how long a packet can travel before it
gets dropped?
- Time to Live
- Header Checksum
- Options
- Type of Service
Q: What is the process of breaking down packets known as?
- Checksum
- Fragment Offset
- Fragmentation
- Flags
Q: Which tcpdump option is used to specify the capture of 5 packets?
- -n 5
- -i 5
- -c 5
- -v 5
Q: Examine the following tcpdump output:
22:00:19.538395 IP (tos 0x10, ttl 64, id 33842, offset 0, flags [P],
proto TCP (6), length 196) 198.168.105.1.41012 > 198.111.123.1.61012: Flags
[P.], cksum 0x50af (correct), seq 169, ack 187, win 501, length 42
Which protocols are being used? Select two answers.
- IP
- UDP
- TCP
- TOS
Q: Fill in the blank: Network protocol analyzers can save network
communications into files known as a _____.
- packet capture
- payload
- protocol
- network packet
Q: Which layer of the TCP/IP model does the Internet Protocol (IP)
operate on?
- Application
- Internet
- Transport
- Network Access
Q: What are some defensive measures that can be used to protect against
data exfiltration? Select two answers.
- Utilize lateral movement
- Deploy multi-factor authentication
- Monitor network activity
- Reduce file sizes
Q: Fill in the blank: The transmission of data between devices on a
network is governed by a set of standards known as _____.
- headers
- payloads
- ports
- protocols