Exam 21: Network Basics for Digital Investigators
Exam 1: Foundations of Digital Forensics 36 Questions
Exam 2: Language of Computer Crime Investigation33 Questions
Exam 3: Digital Evidence in the Courtroom29 Questions
Exam 4: Cybercrime Law: a United States Perspective30 Questions
Exam 5: Cybercrime Law: a European Perspective30 Questions
Exam 6: Conducting Digital Investigations33 Questions
Exam 7: Handling a Digital Crime Scene32 Questions
Exam 8: Investigative Reconstruction With Digital Evidence32 Questions
Exam 9: Modus Operandi, Motive, and Technology32 Questions
Exam 10: Violent Crime and Digital Evidence30 Questions
Exam 11: Digital Evidence As Alibi18 Questions
Exam 12: Sex Offenders on the Internet31 Questions
Exam 13: Computer Intrusions32 Questions
Exam 14: Cyberstalking31 Questions
Exam 15: Computer Basics for Digital Investigators34 Questions
Exam 16: Applying Forensic Science to Computers31 Questions
Exam 17: Digital Evidence on Windows Systems30 Questions
Exam 18: Digital Evidence on Unix Systems30 Questions
Exam 19: Digital Evidence on Macintosh Systems29 Questions
Exam 20: Digital Evidence on Mobile Devices32 Questions
Exam 21: Network Basics for Digital Investigators33 Questions
Exam 22: Applying Forensic Science to Networks35 Questions
Exam 23: Digital Evidence on the Internet30 Questions
Exam 24: Digital Evidence at the Physical and Data-Link Layers34 Questions
Exam 25: Digital Evidence at the Network and Transport Layers30 Questions
Select questions type
Mobile telephones can be used to locate the person using them.
Free
(True/False)
4.9/5
(44)
Correct Answer:
True
When a Windows system connects to a shared folder on another Windows machine on the Internet, which of the following protocols are used?
Free
(Multiple Choice)
4.9/5
(32)
Correct Answer:
D
Individuals who can access the physical layer have unlimited access to all of the data on the network unless it is encrypted.
(True/False)
4.9/5
(29)
The OSI reference model divides Internets into seven layers. Choose the correct order, by layer.
(Multiple Choice)
4.9/5
(26)
Child pornographers are connecting to the home networks of innocent individuals via insecure wireless access points. How can this help or hinder a digital investigation?
(Essay)
4.9/5
(35)
It is possible to reconstruct events surrounding a crime scene using only evidence on networks when the subject's hard drive is not available.
(True/False)
4.9/5
(31)
MAC addresses are uniquely associated with an NIC whereas IP addresses can be changed.
(True/False)
4.8/5
(28)
Capturing network traffic at the physical layer gives investigators access to application layer data such as web pages viewed and images downloaded.
(True/False)
4.8/5
(35)
An understanding of networks helps with which of the following:
(Multiple Choice)
4.7/5
(31)
A hub joins hosts at the physical level whereas a switch joins them at the__________ layer.
(Multiple Choice)
4.8/5
(36)
An understanding of networks is only necessary for investigating computer intrusions and Denial Of Service attacks.
(True/False)
4.9/5
(36)
Showing 1 - 20 of 33
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)