Study for the Ethical Hacking Essentials Test. Explore interactive flashcards and multiple-choice questions with hints and explanations. Prepare thoroughly and boost your exam readiness!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


David captured network traffic using packet sniffing tools to analyze for session hijacking. What method did he use?

  1. Automated scanning

  2. Protocol analysis

  3. Manual method

  4. Intrusion detection system

The correct answer is: Manual method

The method that David used, which involves capturing network traffic to analyze for session hijacking, aligns with protocol analysis. By examining the packets flowing through a network, he can identify vulnerabilities, suspicious activity, and potential attacks such as session hijacking. This analysis often requires specialized tools to dissect the protocols in use and find anomalies or unauthorized sessions. Automated scanning typically involves using software tools to scan for vulnerabilities without the depth of analysis that protocol analysis provides. A manual method could imply hands-on testing or examination that does not specifically focus on traffic capture, while an intrusion detection system is geared towards monitoring and alerting rather than the focused analysis that packet sniffing entails. Thus, the process David undertook is best described by protocol analysis.