{"id":310,"date":"2020-03-29T09:11:29","date_gmt":"2020-03-29T08:11:29","guid":{"rendered":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v10\/certified-ethical-hacker-312-50v10-question297\/"},"modified":"2020-03-29T09:11:29","modified_gmt":"2020-03-29T08:11:29","slug":"certified-ethical-hacker-312-50v10-question297","status":"publish","type":"post","link":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v10\/certified-ethical-hacker-312-50v10-question297\/","title":{"rendered":"Certified Ethical Hacker 312-50v10 &#8211; Question297"},"content":{"rendered":"<div class=\"question\">A companys policy requires employees to perform file transfers using protocols which encrypt traffic. You suspect some employees are still performing file transfers using unencrypted protocols because the employees do not like changes. You have positioned a network sniffer to capture traffic from the laptops used by employees in the data ingest department.<br \/>\nUsing Wireshark to examine the captured traffic, which command can be used as display filter to find unencrypted file transfers?<br \/>\n<br \/><strong><br \/>A.<\/strong> tcpport ==21 <br \/><strong>B.<\/strong> tcp. port = 23 <br \/><strong>C.<\/strong> tcp.port = = 21 | | tcp.port = =22 <br \/><strong>D.<\/strong> tcp.port ! = 21<\/div>\n<p><\/p>\n<style> .hidden-div{ display:none } <\/style>\n<p>\t\t\t\t\t\t\t<button onclick=\"getElementById('hidden-div').style.display = 'block'\"> Show Answer <\/button> <button onclick=\"getElementById('hidden-div').style.display = 'none'\">Hide Answer<\/button><\/p>\n<div class=\"hidden-div\" id=\"hidden-div\"><span style=\"\"><\/p>\n<div class=\"answer\">Correct Answer: <strong>A<\/strong><\/div>\n<p><\/strong><\/span> <\/div>\n","protected":false},"excerpt":{"rendered":"<p>A companys policy requires employees to perform file transfers using protocols which encrypt traffic. You suspect some employees are still performing file transfers using unencrypted protocols because the employees do not like changes. You have positioned a network sniffer to capture traffic from the laptops used by employees in the data ingest department. Using Wireshark [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[2],"tags":[3,300],"_links":{"self":[{"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v10\/wp-json\/wp\/v2\/posts\/310"}],"collection":[{"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v10\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v10\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v10\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v10\/wp-json\/wp\/v2\/comments?post=310"}],"version-history":[{"count":0,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v10\/wp-json\/wp\/v2\/posts\/310\/revisions"}],"wp:attachment":[{"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v10\/wp-json\/wp\/v2\/media?parent=310"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v10\/wp-json\/wp\/v2\/categories?post=310"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v10\/wp-json\/wp\/v2\/tags?post=310"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}