
Ethical Hacking Kali Linux Part 4
Authored by KALAIARASAN SGM
Information Technology (IT)
Professional Development
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is Wireshark primarily used for?
Editing photos
Encrypting data
Capturing and analyzing network traffic
Creating firewalls
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which layer of the OSI model handles IP addressing?
Application Layer
Transport Layer
Network Layer
Data Link Layer
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which Wireshark filter would you use to show only DNS traffic?
tcp.port==53
dns
udp
icmp
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does the filter ip.addr == 192.168.1.10 do?
Blocks all IPs
Shows only HTTP traffic
Displays all traffic to or from 192.168.1.10
Filters out the IP
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which filter displays HTTP GET and POST requests?
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why is using Wireshark on a public network a potential privacy risk?
It can damage the router
It blocks network ports
It automatically shares files
It can capture unencrypted traffic including personal data
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which protocol is considered insecure and can reveal passwords in plain text?
HTTPS
FTP
SFTP
SSH
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?