What other ways could Wireshark be used in a production network?

What will be an ideal response?


Wireshark is often used for security purposes for after-the-fact analysis of normal traffic or after
a network attack. New protocols or services may need to be captured to determine what port or
ports are used.

Computer Science & Information Technology

You might also like to view...

Instances can be modified for all of the following EXCEPT ____.

a. status b. color c. shape d. rotation

Computer Science & Information Technology

To be able to send and receive messages in parallel over a network connection, a program must use __________ of execution.

a. one thread. b. two threads. c. three threads. d. four threads.

Computer Science & Information Technology

The Len, InStr, ________, and ________ functions can be used together to extract information from one field and place it into two new fields

Fill in the blank(s) with correct word

Computer Science & Information Technology

________-based jobs involve a lot of travel for short term projects and the ability to work independently.

A. Office B. Home C. Project D. Field

Computer Science & Information Technology