Investigate the FTP Traffic


In this activity, you will use Packet Tracer to sniff and log network traffic. You will view a security vulnerability in one network application, and view logged ICMP traffic with syslog.
a. Click the Sniffer1 device and then click the GUI tab.
b. Click through some of the first FTP packets in the session. Be sure to scroll down to
view the application layer protocol information in the packet details for each. (This
assumes this is your first FTP session. If you have opened other sessions, clear the window
and repeat the login and file transfer process.)
What is the security vulnerability presented by FTP?
The FTP username and password are transmitted in clear text.
What should be done to mitigate this vulnerability?
Use a secure file transfer protocol such as SFTP.
You might also like to view...
When does a 2-node become a 3-node?
What will be an ideal response?
The following steps are NOT recorded in the history panel: ____.
a. changes to panels b. changes to color settings c. changes to actions and preferences d. all of the above
Substitution is also referred to as permutation
Indicate whether the statement is true or false.
Cell properties apply to all cells in a table.
Answer the following statement true (T) or false (F)