{"id":31187,"date":"2024-08-16T17:47:06","date_gmt":"2024-08-16T17:47:06","guid":{"rendered":"https:\/\/www.writemyessays.app\/blog\/questions\/assignment-using-wireshark-and-netwitness-investigator-to-analyze-wireless-traffic\/"},"modified":"2024-08-16T17:47:06","modified_gmt":"2024-08-16T17:47:06","slug":"assignment-using-wireshark-and-netwitness-investigator-to-analyze-wireless-traffic","status":"publish","type":"questions","link":"https:\/\/www.writemyessays.app\/blog\/questions\/assignment-using-wireshark-and-netwitness-investigator-to-analyze-wireless-traffic\/","title":{"rendered":"Assignment: Using Wireshark and Netwitness Investigator to Analyze Wireless Traffic"},"content":{"rendered":"<div style=\"margin-bottom: 1.5rem; cursor: auto; color: inherit;\">\n<div style=\"line-height: 1.5; cursor: auto; color: inherit;\">\n<div style=\"padding-top: 0.375rem; font-size: 1rem; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\"><\/p>\n<div style=\"cursor: auto; color: inherit;\" data-testid=\"assignments-2-assignment-toggle-details-text\">\n<h2 style=\"padding: 30px 0px 0px; font-weight: 700; font-size: 24px; line-height: 30px; cursor: auto;\">Overview<\/h2>\n<p style=\"margin: 12px 0px; line-height: 1.625; cursor: auto; color: inherit;\">Security administrators routinely deploy tools to monitor and analyze ingress and egress traffic transiting enterprise networks. Wireshark is one of the most widely used packet capture and analysis tools. It enables the capture of network packet traffic and the capability to save frame details in multiple formats that make them usable by the more sophisticated, more expensive software tools.<\/p>\n<h2 style=\"padding: 30px 0px 0px; font-weight: 700; font-size: 24px; line-height: 30px; cursor: auto;\">Directions<\/h2>\n<p style=\"margin: 12px 0px; line-height: 1.625; cursor: auto; color: inherit;\">Consider your lab work and other studies to address each of the following in the Word document that contains your lab screenshots. Clearly label each section.<\/p>\n<ol style=\"margin-right: 0px; margin-bottom: 6px; margin-left: 25px; cursor: auto; color: inherit;\">\n<li style=\"cursor: auto; color: inherit;\">In the PacketCapture.pcapng file you reviewed in Section 1 of the lab, there is a lot of traffic for the TLSv1 protocol. Explain the primary function of the bulk of the traffic.<\/li>\n<li style=\"cursor: auto; color: inherit;\">In the lab, identify any three protocols that you find in the HotspotCapture.pcapng file. Apply Wireshark&#8217;s filtering function to isolate each of the respective protocols that you chose to analyze, and determine the volume of traffic (i.e. number of packets) captured for each protocol. Create a spreadsheet and bar chart that accurately shows a comparison of traffic volume data for the three protocols. This section of the assignment requires you to independently navigate Wireshark in the JBL Lab environment by applying the competencies that you developed during your Week 8 virtual lab experience.<\/li>\n<\/ol>\n<h2 style=\"padding: 30px 0px 0px; font-weight: 700; font-size: 24px; line-height: 30px; cursor: auto;\">Submission Instructions<\/h2>\n<p style=\"margin: 12px 0px; line-height: 1.625; cursor: auto; color: inherit;\">Submit your assignment in a Word document with well-labeled responses.<\/p>\n<h2 style=\"padding: 30px 0px 0px; font-weight: 700; font-size: 24px; line-height: 30px; cursor: auto;\">Competencies Measured<\/h2>\n<p style=\"margin: 12px 0px; line-height: 1.625; cursor: auto; color: inherit;\">By successfully completing this assignment, you will demonstrate your proficiency in the following course competencies and rubric criteria:<\/p>\n<ul style=\"margin-right: 0px; margin-bottom: 6px; margin-left: 25px; cursor: auto; color: inherit;\">\n<li style=\"cursor: auto; color: inherit;\">Competency 1: Apply statistical procedures to information security data.<\/li>\n<ul style=\"margin-right: 0px; margin-left: 25px; cursor: auto; color: inherit;\">\n<li style=\"cursor: auto; color: inherit;\">Create a spreadsheet and histogram to represent traffic data from a filtered query.<\/li>\n<\/ul>\n<li style=\"cursor: auto; color: inherit;\">Competency 2: Analyze network security architecture for vulnerabilities and risk.<\/li>\n<ul style=\"margin-right: 0px; margin-left: 25px; cursor: auto; color: inherit;\">\n<li style=\"cursor: auto; color: inherit;\">Perform network traffic analysis as specified in a lab and evidenced by screenshots.<\/li>\n<li style=\"cursor: auto; color: inherit;\">Explain the primary function of the bulk of the traffic identified in a network analysis report.<\/li>\n<\/ul>\n<\/ul>\n<\/div>\n<p><\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div style=\"cursor: auto; color: inherit;\" data-testid=\"rubric-tab\">\n<div style=\"margin: 0px 0px 1.5rem; cursor: auto; color: inherit;\">\n<div style=\"line-height: 1.5; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 0.75rem; cursor: auto; color: inherit;\"><\/span><span style=\"cursor: auto; color: inherit;\"><span style=\"font-weight: 700; font-size: 1rem; cursor: auto; color: inherit;\">View Rubric<\/span><\/span><\/span><\/p>\n<div style=\"padding-top: 0.375rem; font-size: 1rem; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\">\n<table style=\"font-size: 1rem; cursor: auto; color: inherit;\">\n<caption style=\"cursor: auto; color: inherit;\"><span style=\"margin: -0.0625rem; cursor: auto; color: inherit;\">Using Wireshark and Netwitness Investigator to Analyze Wireless Traffic<\/span><\/caption>\n<thead style=\"font-size: 1rem; cursor: auto; color: inherit;\">\n<tr style=\"cursor: auto; color: inherit;\">\n<th style=\"padding: 7px 10px 14px; font-size: 1rem; line-height: 1.3; cursor: auto; color: inherit;\" aria-sort=\"none\"><\/th>\n<th style=\"padding: 7px 10px 14px; font-size: 1rem; line-height: 1.3; cursor: auto; color: inherit;\" aria-sort=\"none\"><\/th>\n<th style=\"padding: 7px 10px 14px; font-size: 1rem; line-height: 1.3; cursor: auto; color: inherit;\" aria-sort=\"none\" data-testid=\"table-heading-points\"><\/th>\n<\/tr>\n<tr style=\"font-size: 1rem; cursor: auto; color: inherit;\">\n<th style=\"padding: 7px 10px 14px; font-size: 1rem; line-height: 1.3; cursor: auto; color: inherit;\" aria-sort=\"none\">Using Wireshark and Netwitness Investigator to Analyze Wireless Traffic<\/th>\n<\/tr>\n<tr style=\"font-size: 1rem; cursor: auto; color: inherit;\">\n<th style=\"padding: 7px 10px 14px; font-size: 1rem; line-height: 1.3; cursor: auto; color: inherit;\" aria-sort=\"none\">Criteria<\/th>\n<th style=\"padding: 7px 10px 14px; font-size: 1rem; line-height: 1.3; cursor: auto; color: inherit;\" aria-sort=\"none\">Ratings<\/th>\n<th style=\"padding: 7px 10px 14px; font-size: 1rem; line-height: 1.3; cursor: auto; color: inherit;\" aria-sort=\"none\" data-testid=\"table-heading-points\">Pts<\/th>\n<\/tr>\n<\/thead>\n<tbody style=\"font-size: 1rem; cursor: auto; color: inherit;\" data-testid=\"criterions\">\n<tr style=\"font-size: 1rem; cursor: auto; color: inherit;\" data-testid=\"rubric-criterion\">\n<th style=\"padding: 7px 10px 14px; font-size: 1rem; line-height: 1.3; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\"><span style=\"font-weight: 400; font-size: 0.875rem; cursor: auto; color: inherit;\">Perform network traffic analysis as specified in a lab and evidenced by screenshots.<\/span><\/div>\n<div style=\"cursor: auto; color: inherit;\"><\/div>\n<\/th>\n<td style=\"padding: 7px 10px; font-size: 1rem; line-height: 1.3; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\"><\/p>\n<div style=\"padding: 7px 10px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\" data-testid=\"rating-points\"><span style=\"font-weight: 700; font-size: 0.875rem; cursor: auto; color: inherit;\">27.2 to &gt;23.12 pts<\/span><\/div>\n<div style=\"padding-bottom: 0.5em; cursor: auto; color: inherit;\"><span style=\"font-weight: 700; font-size: 0.875rem; line-height: 1.25; cursor: auto; color: inherit;\">DISTINGUISHED<\/span><\/div>\n<p><span style=\"font-size: 0.875rem; line-height: 1.25; cursor: auto; color: inherit;\">Performs network traffic analysis as specified in a lab and evidenced by screenshots and includes a description of what was learned from or observed in the lab, as well as an identification of the specified network device.<\/span><\/p>\n<div style=\"padding-bottom: 1rem; cursor: auto; color: inherit;\"><\/div>\n<div style=\"cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\"><\/div>\n<\/div>\n<\/div>\n<p><\/span><span style=\"cursor: auto; color: inherit;\"><\/p>\n<div style=\"padding: 7px 10px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\" data-testid=\"rating-points\"><span style=\"font-weight: 700; font-size: 0.875rem; cursor: auto; color: inherit;\">23.12 to &gt;19.04 pts<\/span><\/div>\n<div style=\"padding-bottom: 0.5em; cursor: auto; color: inherit;\"><span style=\"font-weight: 700; font-size: 0.875rem; line-height: 1.25; cursor: auto; color: inherit;\">PROFICIENT<\/span><\/div>\n<p><span style=\"font-size: 0.875rem; line-height: 1.25; cursor: auto; color: inherit;\">Performs network traffic analysis as specified in a lab and evidenced by screenshots.<\/span><\/p>\n<div style=\"padding-bottom: 1rem; cursor: auto; color: inherit;\"><\/div>\n<div style=\"cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\"><\/div>\n<\/div>\n<\/div>\n<p><\/span><span style=\"cursor: auto; color: inherit;\"><\/p>\n<div style=\"padding: 7px 10px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\" data-testid=\"rating-points\"><span style=\"font-weight: 700; font-size: 0.875rem; cursor: auto; color: inherit;\">19.04 to &gt;0 pts<\/span><\/div>\n<div style=\"padding-bottom: 0.5em; cursor: auto; color: inherit;\"><span style=\"font-weight: 700; font-size: 0.875rem; line-height: 1.25; cursor: auto; color: inherit;\">BASIC<\/span><\/div>\n<p><span style=\"font-size: 0.875rem; line-height: 1.25; cursor: auto; color: inherit;\">Performs network traffic analysis in an unspecified manner in a lab.<\/span><\/p>\n<div style=\"padding-bottom: 1rem; cursor: auto; color: inherit;\"><\/div>\n<div style=\"cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\"><\/div>\n<\/div>\n<\/div>\n<p><\/span><span style=\"cursor: auto; color: inherit;\"><\/p>\n<div style=\"padding: 7px 10px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\" data-testid=\"rating-points\"><span style=\"font-weight: 700; font-size: 0.875rem; cursor: auto; color: inherit;\">0 pts<\/span><\/div>\n<div style=\"padding-bottom: 0.5em; cursor: auto; color: inherit;\"><span style=\"font-weight: 700; font-size: 0.875rem; line-height: 1.25; cursor: auto; color: inherit;\">NON_PERFORMANCE<\/span><\/div>\n<p><span style=\"font-size: 0.875rem; line-height: 1.25; cursor: auto; color: inherit;\">Does not perform network traffic analysis as specified in a lab and evidenced by screenshots.<\/span><\/p>\n<div style=\"padding-bottom: 1rem; cursor: auto; color: inherit;\"><\/div>\n<div style=\"cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\"><\/div>\n<\/div>\n<\/div>\n<p><\/span><\/span><\/div>\n<\/td>\n<td style=\"padding: 7px 10px; font-size: 1rem; line-height: 1.3; cursor: auto; color: inherit;\" data-testid=\"criterion-points\">\n<div style=\"cursor: auto; color: inherit;\">\/ 27.2 pts<\/div>\n<\/td>\n<\/tr>\n<tr style=\"font-size: 1rem; cursor: auto; color: inherit;\" data-testid=\"rubric-criterion\">\n<th style=\"padding: 7px 10px 14px; font-size: 1rem; line-height: 1.3; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\"><span style=\"font-weight: 400; font-size: 0.875rem; cursor: auto; color: inherit;\">Explain the primary function of the bulk of the traffic identified in a network analysis report.<\/span><\/div>\n<div style=\"cursor: auto; color: inherit;\"><\/div>\n<\/th>\n<td style=\"padding: 7px 10px; font-size: 1rem; line-height: 1.3; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\"><\/p>\n<div style=\"padding: 7px 10px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\" data-testid=\"rating-points\"><span style=\"font-weight: 700; font-size: 0.875rem; cursor: auto; color: inherit;\">26.4 to &gt;22.44 pts<\/span><\/div>\n<div style=\"padding-bottom: 0.5em; cursor: auto; color: inherit;\"><span style=\"font-weight: 700; font-size: 0.875rem; line-height: 1.25; cursor: auto; color: inherit;\">DISTINGUISHED<\/span><\/div>\n<p><span style=\"font-size: 0.875rem; line-height: 1.25; cursor: auto; color: inherit;\">Explains the primary function of the bulk of the traffic identified in a network analysis report in detail that demonstrates a deep understanding of the nature of network traffic.<\/span><\/p>\n<div style=\"padding-bottom: 1rem; cursor: auto; color: inherit;\"><\/div>\n<div style=\"cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\"><\/div>\n<\/div>\n<\/div>\n<p><\/span><span style=\"cursor: auto; color: inherit;\"><\/p>\n<div style=\"padding: 7px 10px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\" data-testid=\"rating-points\"><span style=\"font-weight: 700; font-size: 0.875rem; cursor: auto; color: inherit;\">22.44 to &gt;18.48 pts<\/span><\/div>\n<div style=\"padding-bottom: 0.5em; cursor: auto; color: inherit;\"><span style=\"font-weight: 700; font-size: 0.875rem; line-height: 1.25; cursor: auto; color: inherit;\">PROFICIENT<\/span><\/div>\n<p><span style=\"font-size: 0.875rem; line-height: 1.25; cursor: auto; color: inherit;\">Explains the primary function of the bulk of the traffic from a network analysis report.<\/span><\/p>\n<div style=\"padding-bottom: 1rem; cursor: auto; color: inherit;\"><\/div>\n<div style=\"cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\"><\/div>\n<\/div>\n<\/div>\n<p><\/span><span style=\"cursor: auto; color: inherit;\"><\/p>\n<div style=\"padding: 7px 10px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\" data-testid=\"rating-points\"><span style=\"font-weight: 700; font-size: 0.875rem; cursor: auto; color: inherit;\">18.48 to &gt;0 pts<\/span><\/div>\n<div style=\"padding-bottom: 0.5em; cursor: auto; color: inherit;\"><span style=\"font-weight: 700; font-size: 0.875rem; line-height: 1.25; cursor: auto; color: inherit;\">BASIC<\/span><\/div>\n<p><span style=\"font-size: 0.875rem; line-height: 1.25; cursor: auto; color: inherit;\">Identifies the primary function of the bulk of the traffic identified in a network analysis report, or offers an explanation that has significant errors or omissions.<\/span><\/p>\n<div style=\"padding-bottom: 1rem; cursor: auto; color: inherit;\"><\/div>\n<div style=\"cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\"><\/div>\n<\/div>\n<\/div>\n<p><\/span><span style=\"cursor: auto; color: inherit;\"><\/p>\n<div style=\"padding: 7px 10px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\" data-testid=\"rating-points\"><span style=\"font-weight: 700; font-size: 0.875rem; cursor: auto; color: inherit;\">0 pts<\/span><\/div>\n<div style=\"padding-bottom: 0.5em; cursor: auto; color: inherit;\"><span style=\"font-weight: 700; font-size: 0.875rem; line-height: 1.25; cursor: auto; color: inherit;\">NON_PERFORMANCE<\/span><\/div>\n<p><span style=\"font-size: 0.875rem; line-height: 1.25; cursor: auto; color: inherit;\">Does not identify the primary function of the bulk of the traffic identified in a network analysis report.<\/span><\/p>\n<div style=\"padding-bottom: 1rem; cursor: auto; color: inherit;\"><\/div>\n<div style=\"cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\"><\/div>\n<\/div>\n<\/div>\n<p><\/span><\/span><\/div>\n<\/td>\n<td style=\"padding: 7px 10px; font-size: 1rem; line-height: 1.3; cursor: auto; color: inherit;\" data-testid=\"criterion-points\">\n<div style=\"cursor: auto; color: inherit;\">\/ 26.4 pts<\/div>\n<\/td>\n<\/tr>\n<tr style=\"font-size: 1rem; cursor: auto; color: inherit;\" data-testid=\"rubric-criterion\">\n<th style=\"padding: 7px 10px 14px; font-size: 1rem; line-height: 1.3; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\"><span style=\"font-weight: 400; font-size: 0.875rem; cursor: auto; color: inherit;\">Create a spreadsheet and histogram to represent traffic data from a filtered query.<\/span><\/div>\n<div style=\"cursor: auto; color: inherit;\"><\/div>\n<\/th>\n<td style=\"padding: 7px 10px; font-size: 1rem; line-height: 1.3; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\"><\/p>\n<div style=\"padding: 7px 10px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\" data-testid=\"rating-points\"><span style=\"font-weight: 700; font-size: 0.875rem; cursor: auto; color: inherit;\">26.4 to &gt;22.44 pts<\/span><\/div>\n<div style=\"padding-bottom: 0.5em; cursor: auto; color: inherit;\"><span style=\"font-weight: 700; font-size: 0.875rem; line-height: 1.25; cursor: auto; color: inherit;\">DISTINGUISHED<\/span><\/div>\n<p><span style=\"font-size: 0.875rem; line-height: 1.25; cursor: auto; color: inherit;\">Creates a professional spreadsheet and histogram that is clear, concise, and well labeled to represent measured traffic data.<\/span><\/p>\n<div style=\"padding-bottom: 1rem; cursor: auto; color: inherit;\"><\/div>\n<div style=\"cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\"><\/div>\n<\/div>\n<\/div>\n<p><\/span><span style=\"cursor: auto; color: inherit;\"><\/p>\n<div style=\"padding: 7px 10px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\" data-testid=\"rating-points\"><span style=\"font-weight: 700; font-size: 0.875rem; cursor: auto; color: inherit;\">22.44 to &gt;18.48 pts<\/span><\/div>\n<div style=\"padding-bottom: 0.5em; cursor: auto; color: inherit;\"><span style=\"font-weight: 700; font-size: 0.875rem; line-height: 1.25; cursor: auto; color: inherit;\">PROFICIENT<\/span><\/div>\n<p><span style=\"font-size: 0.875rem; line-height: 1.25; cursor: auto; color: inherit;\">Creates a spreadsheet and histogram to represent measured traffic data from a filtered query.<\/span><\/p>\n<div style=\"padding-bottom: 1rem; cursor: auto; color: inherit;\"><\/div>\n<div style=\"cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\"><\/div>\n<\/div>\n<\/div>\n<p><\/span><span style=\"cursor: auto; color: inherit;\"><\/p>\n<div style=\"padding: 7px 10px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\" data-testid=\"rating-points\"><span style=\"font-weight: 700; font-size: 0.875rem; cursor: auto; color: inherit;\">18.48 to &gt;0 pts<\/span><\/div>\n<div style=\"padding-bottom: 0.5em; cursor: auto; color: inherit;\"><span style=\"font-weight: 700; font-size: 0.875rem; line-height: 1.25; cursor: auto; color: inherit;\">BASIC<\/span><\/div>\n<p><span style=\"font-size: 0.875rem; line-height: 1.25; cursor: auto; color: inherit;\">Creates a spreadsheet and histogram that poorly represents measured traffic data.<\/span><\/p>\n<div style=\"padding-bottom: 1rem; cursor: auto; color: inherit;\"><\/div>\n<div style=\"cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\"><\/div>\n<\/div>\n<\/div>\n<p><\/span><span style=\"cursor: auto; color: inherit;\"><\/p>\n<div style=\"padding: 7px 10px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\" data-testid=\"rating-points\"><span style=\"font-weight: 700; font-size: 0.875rem; cursor: auto; color: inherit;\">0 pts<\/span><\/div>\n<div style=\"padding-bottom: 0.5em; cursor: auto; color: inherit;\"><span style=\"font-weight: 700; font-size: 0.875rem; line-height: 1.25; cursor: auto; color: inherit;\">NON_PERFORMANCE<\/span><\/div>\n<p><span style=\"font-size: 0.875rem; line-height: 1.25; cursor: auto; color: inherit;\">Does not create a spreadsheet or histogram.<\/span><\/p>\n<div style=\"padding-bottom: 1rem; cursor: auto; color: inherit;\"><\/div>\n<div style=\"cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\"><\/div>\n<\/div>\n<\/div>\n<p><\/span><\/span><\/div>\n<\/td>\n<td style=\"padding: 7px 10px; font-size: 1rem; line-height: 1.3; cursor: auto; color: inherit;\" data-testid=\"criterion-points\">\n<div style=\"cursor: auto; color: inherit;\">\/ 26.4 pts<\/div>\n<\/td>\n<\/tr>\n<tr style=\"font-size: 1rem; cursor: auto; color: inherit;\">\n<td style=\"padding: 7px 10px; font-size: 1rem; line-height: 1.3; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\" data-testid=\"rubric-total\" data-selenium=\"rubric_total\">Total Points: 0<\/span><\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Overview Security administrators routinely deploy tools to monitor and analyze ingress and egress traffic transiting enterprise networks. Wireshark is one of the most widely used packet capture and analysis tools. It enables the capture of network packet traffic and the capability to save frame details in multiple formats that make them usable by the more [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","meta":[],"disciplines":[62],"paper_types":[],"tagged":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions\/31187"}],"collection":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions"}],"about":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/types\/questions"}],"author":[{"embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/comments?post=31187"}],"version-history":[{"count":0,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions\/31187\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/media?parent=31187"}],"wp:term":[{"taxonomy":"disciplines","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/disciplines?post=31187"},{"taxonomy":"paper_types","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/paper_types?post=31187"},{"taxonomy":"tagged","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/tagged?post=31187"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}