In Wireshark, which display filter tokens are used to specify IP addresses and TCP ports?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

In Wireshark, which display filter tokens are used to specify IP addresses and TCP ports?

Explanation:
In Wireshark, you filter on fields from the packet headers. To target IPs you use ip.src for the source IP and ip.dst for the destination IP. For TCP ports, you can use tcp.srcport and tcp.dstport to filter on the ports on each side, or use tcp.port as a convenient way to match either side’s port. So the tokens ip.src, ip.dst, tcp.port, tcp.srcport, and tcp.dstport together cover filtering by IP addresses and TCP ports. Other tokens correspond to DNS names, HTTP host, ARP addresses, or MAC addresses, which aren’t the IP/TCP port fields in question.

In Wireshark, you filter on fields from the packet headers. To target IPs you use ip.src for the source IP and ip.dst for the destination IP. For TCP ports, you can use tcp.srcport and tcp.dstport to filter on the ports on each side, or use tcp.port as a convenient way to match either side’s port. So the tokens ip.src, ip.dst, tcp.port, tcp.srcport, and tcp.dstport together cover filtering by IP addresses and TCP ports. Other tokens correspond to DNS names, HTTP host, ARP addresses, or MAC addresses, which aren’t the IP/TCP port fields in question.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy