1. On a switch, each switchport represents a ____________.
- A) VLAN
 - B) Broadcast domain
 - C) Host
 - D) Collision domain
 
Show Answer
2. Wireless access points function as a ____________.
- A) Hub
 - B) Bridge
 - C) Router
 - D) Repeater
 
Show Answer
3. What mode must be configured to allow an NIC to capture all traffic on the wire?
- A) Extended mode
 - B) 10/100
 - C) Monitor mode
 - D) Promiscuous mode
 
Show Answer
4. Which of the following prevents ARP poisoning?
- A) ARP Ghost
 - B) IP DHCP Snooping
 - C) IP Snoop
 - D) DNSverf
 
Show Answer
5. Jennifer is a system administrator who is researching a technology that will secure network traffic from potential sniffing by unauthorized machines. Jennifer is not concerned with the future impact on legitimate troubleshooting. What technology can Jennifer implement?
- A) SNMP
 - B) LDAP
 - C) SSH
 - D) FTP
 
Show Answer
6. MAC spoofing applies a legitimate MAC address to an unauthenticated host, which allows the attacker to pose as a valid user. Based on your understanding of ARP, what would indicate a bogus client?
- A) The MAC address doesn’t map to a manufacturer.
 - B) The MAC address is two digits too long.
 - C) A reverse ARP request maps to two hosts.
 - D) The host is receiving its own traffic.
 
Show Answer
7. Bob is attempting to sniff a wired network in his first pen test contract. He sees only traffic from the segment he is connected to. What can Bob do to gather all switch traffic?
- A) MAC flooding
 - B) MAC spoofing
 - C) IP spoofing
 - D) DOS attack
 
Show Answer
8. What technique funnels all traffic back to a single client, allowing sniffing from all connected hosts?
- A) ARP redirection
 - B) ARP poisoning
 - C) ARP flooding
 - D) ARP partitioning
 
Show Answer
9. Which Wireshark filter displays only traffic from 192.168.1.1?
- A) ip.addr =! 192.168.1.1
 - B) ip.addr ne 192.168.1.1
 - C) ip.addr == 192.168.1.1
 - D) ip.addr – 192.168.1.1
 
Show Answer
10. What common tool can be used for launching an ARP poisoning attack?
- A) Cain & Abel
 - B) Nmap
 - C) Scooter
 - D) Tcpdump
 
Show Answer
11. Which command launches a CLI version of Wireshark?
- A) Wireshk
 - B) dumpcap
 - C) tshark
 - D) editcap
 
Show Answer
12. Jennifer is using tcpdump to capture traffic on her network. She would like to save the capture for later review. What command can Jennifer use?
- A) tcpdump –r capture.log
 - B) tcpdump –l capture.log
 - C) tcpdump –t capture.log
 - D) tcpdump –w capture.log
 
Show Answer
13. What is the generic syntax of a Wireshark filter?
- A) protocol.field operator value
 - B) field.protocol operator value
 - C) operator.protocol value field
 - D) protocol.operator value field
 
Show Answer
14. Tiffany is analyzing a capture from a client’s network. She is particularly interested in NetBIOS traffic. What port does Tiffany filter for?
- A) 123
 - B) 139
 - C) 161
 - D) 110
 
Show Answer
15. Based on the packet capture shown in the graphic, what is contained in the highlighted section of the packet?

- A) The frame value of the packet
 - B) The MAC address of the sending host
 - C) Source and destination IP addresses
 - D) The routed protocol value
 
Show Answer
16. Jennifer is using tcpdump to capture traffic on her network. She would like to review a capture log gathered previously. What command can Jennifer use?
- A) tcpdump –r capture.log
 - B) tcpdump – l capture.log
 - C) tcpdump –t capture.log
 - D) tcpdump –w capture.log
 
Show Answer
17. Wireshark requires a network card to be able to enter which mode to sniff all network traffic?
- A) Capture mode
 - B) Promiscuous mode
 - C) Pcap mode
 - D) Gather mode
 
Show Answer
18. Which network device can block sniffing to a single network collision domain, create VLANs, and make use of SPAN ports and port mirroring?
- A) Hub
 - B) Switch
 - C) Router
 - D) Bridge
 
Show Answer
19. What device will neither limit the flow of traffic nor have an impact on the effectiveness of sniffing?
- A) Hub
 - B) Router
 - C) Switch
 - D) Gateway
 
Show Answer
20. The command-line equivalent of WinDump is known as what?
- A) Wireshark
 - B) Tcpdump
 - C) WinDump
 - D) Netstat
 
