Using Wire shark to examine the captured traffic, which command can be used as a display filter to find unencrypted file transfers?

A company’s policy requires employees to perform file transfers using protocols which encrypt traffic. You suspect some employees are still performing file transfers using unencrypted protocols because the employees do not like changes. You have positioned a network sniffer to capture traffic from the laptops used by employees in the data ingest department.

Using Wire shark to examine the captured traffic, which command can be used as a display filter to find unencrypted file transfers?
A . tcp.port != 21
B . tcp.port = 23
C . tcp.port ==21
D . tcp.port ==21 || tcp.port ==22

Answer: D

Latest CPEH-001 Dumps Valid Version with 736 Q&As

Latest And Valid Q&A | 90 Days Free Update | Once Fail, Full Refund

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>