Decoding Network Traffic | SY0-601 Exam: CompTIA Security+

Deciphering Network Traffic

Prev Question Next Question

Question

Ann a security analyst is monitoring the IDS console and noticed multiple connections from an internal host to a suspicious call back domain.

Which of the following tools would aid her to decipher the network traffic?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

C.

The correct answer is D. Packet Analyzer.

A packet analyzer, also known as a network analyzer or protocol analyzer, is a tool used to capture, analyze, and interpret network traffic. It allows the security analyst to inspect the contents of each packet, including the source and destination addresses, the protocol being used, and any data being transmitted.

In this scenario, Ann has noticed multiple connections from an internal host to a suspicious call back domain. A packet analyzer would help her analyze the network traffic to determine if the internal host is communicating with the malicious domain and what type of data is being transmitted.

Option A, Vulnerability Scanner, is a tool that scans networks or systems for known vulnerabilities but would not be useful in deciphering network traffic.

Option B, NMAP, is a tool used for network exploration and security auditing, but it is not designed for analyzing individual network packets.

Option C, NETSTAT, is a command-line tool used to display active network connections and their respective states on a host. However, it does not capture or analyze network traffic, so it would not be useful in this scenario.