why not C ? P Reassembly is a feature in Wireshark and TShark to automatically reassemble all fragmented IP Datagrams into a full IP packet before ... This feature will require a lot of extra memory to be consumed by wireshark in order to store the ... You have captured packets with a SnapLen less than the MTU of the ...
BE is the correct answer.
About B: Packet capture enables teams to deal with complex network issues with ease and efficiency. - https://www.solarwinds.com/resources/it-glossary/pcap
BD
Not only are network protocol analyzers used for security analysis. They are also very useful for network troubleshooting, software and protocol development, and education. For instance, in security forensics, a security analyst may attempt to reconstruct an incident from relevant packet captures.
The two characteristics of full packet captures are:
B. Troubleshooting the cause of security and performance issues.
E. Providing a historical record of a network transaction.
Options A, C, and D are not characteristics of full packet captures
Option C is not necessarily wrong, but it is not one of the two characteristics of full packet captures that the question is asking for.
Reassembling fragmented traffic from raw data is a capability of full packet capture and can be useful for analyzing and understanding network traffic. However, the question is specifically asking for the two main characteristics of full packet capture.
Let's start from the word itself. "Characterstics"
Characteristics - a feature or quality belonging typically to a person, place, or thing and serving to identify it.
>>Characteristics<<
- Reassembling fragmented traffic from raw data.
- Providing a historical record of a Network Transaction.
>>Use cases or Diagnostics<<
- Identifying network loops and Collision Domains.
- Troubleshooting the cause of security and performance issues.
- Detecting common hardware faults and identify faulty assets.
It is BE. The question is about full packet capture and not about packet analysers.
"Full Packet Capture (FPC) provides a network defender an after-the-fact investigative
capability that other security tools cannot provide. Uses include capturing malware
samples, network exploits and determining if data exfiltration has occurred. Full packet
captures are a valuable troubleshooting tool for operations and security teams alike."
https://sansorg.egnyte.com/dl/v6XafdW96e
I agreee with anonymous1966. I think that correct answer is CE.
C. Reassembling fragmented traffic from raw data.
There is reassembly feature in Wireshark.
https://wiki.wireshark.org/IP_Reassembly#
E. Providing a historical record of a network transaction.
Packet captures provide a full historical record of a
network transaction or an attack. It is important to
recognize that no other data source offers this level
of detail.
From Book:Omar Santos - Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide
"C" is correct.
IP Reassembly
IP Reassembly is a feature in Wireshark and TShark to automatically reassemble all fragmented IP Datagrams into a full IP packet before calling the higher layer dissector.
Ref: https://wiki.wireshark.org/IP_Reassembly
This feature will require a lot of extra memory to be consumed by wireshark in order to store the reassembly buffers and is disabled by default.
"E" is correct.
By the book:
Packet captures provide a full historical record of a network transaction or an attack. It is important to recognize that no other data source offers this level of detail.
There are many study of cases of using Wireshark to troubleshooting the cause of security and performance issues. So, "B" would also be right. But the other options are more direct.
This section is not available anymore. Please use the main Exam Page.200-201 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
evra
Highly Voted 4 years agoharshi
3 years, 10 months ago3000bd6
Most Recent 5 months, 4 weeks agod503c75
8 months agoRoBery
1 year, 4 months agosheyshey
1 year, 5 months agotoirdem
1 year, 8 months agoTopsecret
1 year, 10 months agodrdecker100
2 years, 2 months agoSecurityGuy
2 years, 3 months agocy_analyst
2 years, 6 months agoSecurityGuy
2 years, 3 months agocy_analyst
2 years, 7 months agocy_analyst
2 years, 6 months agotheodorrrr
2 years, 6 months agoEng_ahmedyoussef
2 years, 7 months agoevra
3 years agohalamah
3 years, 6 months agoalocin
3 years, 7 months ago[Removed]
3 years, 7 months agoanonymous1966
3 years, 8 months ago