Questions

Now it's time to check your knowledge. Select the best response, and then check your answers, which can be found in the Assessment:

  1. In Preferences, _____ is where you can customize your column headers. You can use the default layout, remove any of the visible fields as shown, or drag additional columns to where you would like them.
    1. Account
    2. Uploads
    3. Decode Window
    4. Capture Index
  2. In addition to the standard filters, you can also search for a specific image by using a _____ filter.
    1. Decode
    2. String
    3. Hex
    4. Craft
  1. __ are similar to the flow graphs in Wireshark, which show the endpoints communicating back and forth.
    1. Ladder diagrams
    2. Step charts
    3. VoIP ladders
    4. Time intervals
  2. At the bottom of the endpoints report, you will see a button to select ___. When selected, it will visually show where the packets originate.
    1. Step charts
    2. Craft
    3. Time interval
    4. GeoIP Map
  3. __ is a more advanced option that will scan the capture for potentially malicious traffic within the capture.
    1. Malicious conversations
    2. Malicious endpoints
    3. Threat assessments
    4. Threat maps
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.217.203.172