# Question

Inspect the nmap\_frag\_fw\_bypass.pcapng file, part of this module's resources, and enter the total count of packets that have the TCP RST flag set as your answer.

Open `nmap_frag_fw_bypass.pcapng` in Wireshark and set the display filter:

```
tcp.flags.reset == 1
```
