1.

Find out the time difference between sending of second HTTP GET message and the receiving of corresponding HTTP OK reply .

 

Question 1 of 50

2.

The packet whose packet details is available in below image is a fragmented packet.

Question 2 of 50

3.

Referring to Packet 1513 in below, What should be the size of its layer 3 header ?

Question 3 of 50

4.

Choose a correct statement for the packet details as given in below image

 

Question 4 of 50

5. There is no option in Wireshark to check the throughput of the captured traffic.

Question 5 of 50

6.

Below image has a packet related to a SSL transaction, what can be source in this packet ?

Question 6 of 50

7.

Which field can be there in between Content Type and Length in below image

 

Question 7 of 50

8.

What is the link layer address of the source in below image ?

Question 8 of 50

9. What is the purpose of Transaction ID field in a DHCP packet ?

Question 9 of 50

10. Which of the following is not a DHCP step ?

Question 10 of 50

11.

What type of ICMP message is available in below image ?

Question 11 of 50

12. What is the Protocol Number for UDP in hexadecimal notation ?

Question 12 of 50

13. UDP is a three-way handshake protocol

Question 13 of 50

14. Which length is available in the length column in below image ?

Question 14 of 50

15. What is the largest possible source port in UDP ?

Question 15 of 50

16.

Below image has packet details for a TCP packet with basic header and without any optional fields.

Question 16 of 50

17. Wireshark can be used to modify packets.

Question 17 of 50

18. ARP Protocol belongs to Layer 3.

Question 18 of 50

19.

Referring to 'Packet Details' window in below image, what can be the opcode ?

Question 19 of 50

20. PPTP belongs to which layer of OSI model ?

Question 20 of 50

21. Installation of a network TAP doesn't result in any outage in the network.

Question 21 of 50

22. This capture mode allows setting interface to capture all packets on a network segment to which it is associated to, Identify this capture mode.

Question 22 of 50

23. Wireshark doesn't support string based filtering.

Question 23 of 50

24. Identify this Logical Operator '^^'

Question 24 of 50

25. What is the keyboard shortcut to start/stop capturing in Wireshark ?

Question 25 of 50

26.

There is an icon of toolbar item of Wireshark in below image, what is its use ?

 

Question 26 of 50

27. Wireshark can display CRC error in a packet.

Question 27 of 50

28. I/O Graph can not display packets per second rate of the traffic.

Question 28 of 50

29. Which of the following SIP request methods is used to publish an event to the server ?

Question 29 of 50

30. Which SIP response is represented by 6xx ?

Question 30 of 50

31. This protocol is used by a host to check the uniqueness of IP address assigned to it's system and to check the presence of a duplicate of IP address assigned to it's system, Identify this protocol.

Question 31 of 50

32. Select a service which does not use TCP.

Question 32 of 50

33. What is the range of Class C private address ?

Question 33 of 50

34. Where can you position a hub in the OSI model ?

Question 34 of 50

35. This protocol is used to send a destination network unknown message back to originating hosts, Identify this Protocol.

Question 35 of 50

36. Choose a function related to VLANs in a network.

Question 36 of 50

37. Ping is related to which protocol ?

Question 37 of 50

38. Its a protocol using which a proxy device on a given network answers the ARP queries for an IP address that is not on that network, Identify this protocol.

Question 38 of 50

39. Select a transport layer protocol.

Question 39 of 50

40. Which of the following is related to network layer ?

Question 40 of 50

41. Identify a attribute which is not related to data link layer ?

Question 41 of 50

42. Choose a correct option related to a DoS attack

Question 42 of 50

43. Its not an application layer protocol, Identify this protocol.

Question 43 of 50

44. What is the standard port no. used by SSH protocol ?

Question 44 of 50

45. Which is true for DNS database ?

Question 45 of 50

46. How many parallel TCP connections are maintained by FTP for transferring a file ?

Question 46 of 50

47. How does a TCP connection gets established ?

Question 47 of 50

48. There is an attack wherein large number of SYNC segments are sent to a server, each of them seems to be coming from a different client by spoofing the source IP address. Identify this attack type.

Question 48 of 50

49. This format is not related to RTP, Identify this format.

Question 49 of 50

50. This protocol provides synchronization between media streams, identify this protocol.

Question 50 of 50