audits

  • Explain three possible uses of a SPAN port that you might use as a forensic investigator.
  • Explain two disadvantages of a SPAN port you might encounter as a forensic investigator.
  • Wireshark supports two types of filters. Research, and in a full paragraph for each, address the following:
    • Explain each and when you might use each.
    • Describe three non-Ethernet protocols Wireshark can capture.
  • Many brute force programs will use dictionary words. Describe how you could build a dictionary for such use in a program like Bruter®.
Tags: No tags