Medium difficulty challenges.

The IT Security Officer decides to take things in his own hands and conduct his own investigation. He opens up a spanning port on the switch and dumps all network traffic. Analyse the trace file provided to reveal the suspect's name to be cleared during this challenge and answer all the questions in the quiz.