1.
The TCP handshake consists of SYN, SYN/ACK, and ACK packets.
Correct Answer
A. True
Explanation
The TCP handshake is a process that occurs at the beginning of a TCP connection. It consists of three steps: SYN, SYN/ACK, and ACK packets. In the first step, the client sends a SYN packet to the server to initiate the connection. The server responds with a SYN/ACK packet, indicating that it has received the request and is willing to establish a connection. Finally, the client sends an ACK packet to acknowledge the server's response and complete the handshake. Therefore, the statement is true.
2.
Wireshark was founded in 1990.
Correct Answer
B. False
Explanation
The statement is false because Wireshark was not founded in 1990. Wireshark was actually created in 1998 under the name Ethereal by Gerald Combs. It was later renamed to Wireshark in 2006.
3.
The Wireshark IO Graph can be used to view the packets-per-second rate of traffic.
Correct Answer
A. True
Explanation
The Wireshark IO Graph is a powerful tool that allows users to visualize and analyze network traffic. One of its features is the ability to display the packets-per-second rate of traffic. By plotting this information on a graph, users can easily observe the rate at which packets are being transmitted and received, helping them to identify patterns, anomalies, or potential issues in the network. Therefore, the statement "The Wireshark IO Graph can be used to view the packets-per-second rate of traffic" is true.
4.
The filter ip.addr == 10.10.10.10 can be used as a capture filter.
Correct Answer
A. True
Explanation
The filter "ip.addr == 10.10.10.10" can be used as a capture filter because it specifies that only packets with a source or destination IP address of 10.10.10.10 should be captured. This filter allows for capturing and analyzing network traffic specifically related to that IP address, which can be useful for troubleshooting or monitoring purposes.
5.
The promiscuous mode must be enabled when using Wireshark to capture traffic between other hosts on a network.
Correct Answer
A. True
Explanation
When using Wireshark to capture traffic between other hosts on a network, the promiscuous mode must be enabled. This mode allows the network interface to capture all network traffic, not just the traffic intended for the specific host. By enabling promiscuous mode, Wireshark can capture and analyze all network packets, providing a comprehensive view of the network activity. Without enabling promiscuous mode, Wireshark would only capture the traffic intended for the host running the software, limiting its effectiveness in capturing and analyzing network traffic.
6.
Originally it was named Ethereal.
Correct Answer
A. True
Explanation
The given statement is true. The original name of the product mentioned was indeed Ethereal.
7.
Wireshark Capture Filters can be applied to saved trace files.
Correct Answer
B. False
Explanation
Wireshark Capture Filters cannot be applied to saved trace files. Capture filters are used to filter the packets that are captured in real-time during a Wireshark session. They are applied before the packets are captured and saved to a trace file. Once the trace file is saved, it cannot be modified or filtered using capture filters. However, display filters can be applied to already saved trace files to filter and analyze the captured packets.
8.
UDP is a connection-oriented transport protocol.
Correct Answer
B. False
Explanation
The given statement is incorrect. UDP (User Datagram Protocol) is actually a connectionless transport protocol. Unlike connection-oriented protocols like TCP, UDP does not establish a dedicated connection before transmitting data. Instead, it simply sends data packets without any guarantee of delivery or order.
9.
Wireshark relies on the WinPcap driver when running on a Windows host.
Correct Answer
A. True.
Explanation
Wireshark is a network protocol analyzer that captures and analyzes network traffic. It relies on the WinPcap driver, which is a library that allows packet capture and network analysis on Windows operating systems. Therefore, the statement "Wireshark relies on the WinPcap driver when running on a Windows host" is true.
10.
Wireshark is written in C, C++.
Correct Answer
A. True
Explanation
Wireshark is an open-source network protocol analyzer that allows users to capture and analyze network traffic. It is indeed written in C and C++. These programming languages are commonly used for developing low-level applications and are well-suited for tasks involving network packet analysis and manipulation. Therefore, the statement "Wireshark is written in C, C++" is true.