Study Guide Questions Flashcards
(158 cards)
What is the purpose of network analysis?
Identify performance problems, locate security breaches, analyze application behavior, and perform capacity planning
Name at least three troubleshooting tasks that can be performed using network analysis.
- Locate faulty network devices
- Identify device or software misconfigurations
- Measure high delays along a path
- Locate the point of packet loss
- Identify network errors and service refusals
- Graph queuing delays
Why is network analysis considered a security risk by some companies?
It involves tapping into network traffic and eavesdropping on communications potentially showing unencrypted communication.
What is the purpose of WinPcap?
Windows port of the libpcap interface. Provides low-level network access and the Windows version of the libpcap API.
What is the purpose of Wireshark’s dissectors?
Decode packets to display field contents and intepreted values, plugins provide special routines for dissection, display filters define which packets are displayed
What is the purpose of the Wiretap library?
Enables Wireshark to ready a variety of trace file formats.
If you connect a Wireshark host directly into a switch, what traffic can you expect to see by default?
By default, switches forward all broadcast packets, multicast packets (unless configured to block multicast forwarding), packets destined to the Wireshark host’s hardware address and packets destined to unknown hardware addresses.
What is the difference between monitor mode and promiscuous mode?
In monitor mode, the driver doesn’t make the adapter a member of any service set. In this mode, an adapter and driver pass all packets of all SSIDs from the currently selected channel up to Wireshark. Promiscuous mode enables a network card and driver to capture traffic that is addressed to other devices on the network, not just to the local hardware address.
What is the purpose of file sets?
File sets are contiguous files that can be individually opened and examined faster than single files.
What is the difference between capture filters and display filters?
Capture filters limit the packets captured when you are on a busy network or are focusing on a specific type of traffic. Display filters limit the packets displayed from a full capture.
What format is used by Wireshark’s capture filters?
Berkeley Packet Filtering (BPF)
What is the purpose of the following capture filters?
ether dst 08:3f:3d:03:32:03
gateway rtrmain01
host www.espn.com
Captures all traffic sent to that MAC address.
Captures all traffic to or from the MAC address of that hostname. Must be able to resolve the hostname.
Captures all traffic sent to or from the IP belonging to www.espn.com.
How does Wireshark’s network name resolution use DNS to associate an IP address with a host name?
Uses hosts file lookup or inverse DNS queries to resolve IPs to host names.
Why would you want to alter Wireshark’s preference settings?
To customize Wireshark for your network environment. These settings include the panes displayed in the main Wireshark window, capture settings, the name resolution processes, individual dissector behavior, etc.
What is the difference between a global preference and a personal preference setting?
Global preferences are system-wide preferences. Personal preferences define customized Wireshark behavior and override the global preferences.
What is the difference between marking packets and applying a coloring rule?
Packet marking is a temporary designation that is cleared when you reload the trace file, open the trace file again or toggle the packet marking off. Coloring rules are automatically applied to the traffic each time you open the trace file.
How do you share coloring rules with other Wireshark users?
Import/export out of the coloring rules window or copy the colorfilters file.
You have created a coloring rule for ICMP Type 3 traffic as shown in the figure below. How can you ensure that ICMP Type 3 packets are colored with this new rule?
Coloring rules follow a top down logic. Make sure your rule is not being overridden by a higher rule.
How can the time setting be used to identify the cause of network performance problems?
Set the Time column to Seconds since Previously Displayed Packet and look for large gaps in time in a conversation during what should be an automated streaming process.
You have opened a trace file sent to you from another company. The timestamp only shows millisecond resolution. Why? Can you improve the timestamp resolution of the trace file?
The analyzer used to capture the trace file could not provide more precise timestamps. You cannot alter the timestamp resolution of captured trace files.
You have opened a trace file that contains 5 separate conversations. How can Time Reference be used to measure the time elapsed in one of the conversations?
Set a Time Reference on the first packet of the conversation you are interested in and scroll to the end of the conversation. The Time column will indicate the time elapsed from the Time Reference packet and the last packet of the conversation.
How can you use the Protocol Hierarchy window to identify a breached host?
After capturing traffic to and from the host, open the Protocol Hierarchy window to look for unusual applications such as TFTP, IRC, etc. You can apply a display filter for the conversation from inside the Protocol Hierarchy window and then follow the TCP or UDP stream to reassemble the communications and identify commands or information exchanged.
Your trace file contains over 100 TCP connections. How can you identify the most active (bytes/second) TCP connections?
Open the Statistics | Conversations window and select the TCP tab. Sort the information by the Bytes column. You can now right-click and apply a filter based on the most active conversation for further analysis.
What is the purpose of GeoIP?
GeoIP maps IP addresses in the Endpoints window to an OpenStreetMap view of the world.