Internet Protocol Analysis/Packet Analyzers/Quiz

{ A computer program or a piece of computer hardware that can intercept and log traffic passing over a digital network is known as a { packet analyzer (i) _17 }.
 * type="{}" coef="1"}

{ Packet analyzers can be { software or hardware- (i) _23 } based.
 * type="{}" coef="1"}

{ Network interface cards (NICs) normally drop frames that are not { broadcast (i) _11 } or { multicast (i) _11 }, and do not have the NIC as the { destination (i) _13 } MAC address.
 * type="{}" coef="3"}

{ A network interface controller (NIC) mode that causes the controller to pass all traffic it receives to the central processing unit (CPU) rather than passing only the frames that the controller is intended to receive is known as { promiscuous (i) _13 } mode.
 * type="{}" coef="1"}

{ Network interface controllers (NICs) operating in promiscuous mode may or may not be detectable, depending on { firewall (i) _10 } settings.
 * type="{}" coef="1"}

{ The ability for a network switch to send a copy of network packets seen on one switch port (or an entire VLAN) to a network monitoring connection on another switch port is known as { port mirroring (i) _16 }.
 * type="{}" coef="1"}

{ An example of a free and open-source packet analyzer used for network troubleshooting, analysis, software and communications protocol development, and education is { Wireshark (i) _11 }.
 * type="{}" coef="1"}

{ Wireshark was originally named { Ethereal (i) _10 }, but was renamed in May 2006 due to trademark issues.
 * type="{}" coef="1"}

{ A command line-based packet analyzer available on most Unix-like operating systems is { tcpdump (i) _9 }.
 * type="{}" coef="1"}

{ Packet { capture (i) _9 } activities must be run with special privileges, but packet { analysis (i) _10 } activities do not require special privileges.
 * type="{}" coef="2"}

{ Packet analyzers such as Wireshark and tcpdump depend on a packet capture library known as { libpcap (i) _9 } or { WinPcap (i) _9 }.
 * type="{}" coef="2"}