Now it's time to check your knowledge. Select the best response, and then check your answers, which can be found in the Assessment:
- Packet analysis has been around in some form since the _____ as a diagnostic tool to observe data and other information traveling across the network.
- 1950s
- 1960s
- 1970s
- 1990s
- Packet analysis is used in the real world in many forms. One is the DHS _____system, which monitors for threats.
- CARVER
- Packet
- EINSTEIN
- DESTINY3
- In the expert system, _____ provides information about typical workflows such as TCP window updates or connection finishes.
- Note
- Chat
- Error
- Warn
- A ____ provides a snapshot of network traffic during a window of time using Wireshark or Tshark. Characteristics can include utilization, network protocols, and effective throughput forwarding rates.
- Round Robin
- DORA process
- Baseline
- WinCheck
- Monitoring for threats occurs in one of three ways. _____ is when a system has fallen victim to an attack and the incident response team manages the attack, followed by a forensic exercise.
- Proactive
- Reactive
- Active
- Redactive