Exam 24: Digital Evidence at the Physical and Data-Link Layers
Exam 1: Foundations of Digital Forensics 36 Questions
Exam 2: Language of Computer Crime Investigation33 Questions
Exam 3: Digital Evidence in the Courtroom29 Questions
Exam 4: Cybercrime Law: a United States Perspective30 Questions
Exam 5: Cybercrime Law: a European Perspective30 Questions
Exam 6: Conducting Digital Investigations33 Questions
Exam 7: Handling a Digital Crime Scene32 Questions
Exam 8: Investigative Reconstruction With Digital Evidence32 Questions
Exam 9: Modus Operandi, Motive, and Technology32 Questions
Exam 10: Violent Crime and Digital Evidence30 Questions
Exam 11: Digital Evidence As Alibi18 Questions
Exam 12: Sex Offenders on the Internet31 Questions
Exam 13: Computer Intrusions32 Questions
Exam 14: Cyberstalking31 Questions
Exam 15: Computer Basics for Digital Investigators34 Questions
Exam 16: Applying Forensic Science to Computers31 Questions
Exam 17: Digital Evidence on Windows Systems30 Questions
Exam 18: Digital Evidence on Unix Systems30 Questions
Exam 19: Digital Evidence on Macintosh Systems29 Questions
Exam 20: Digital Evidence on Mobile Devices32 Questions
Exam 21: Network Basics for Digital Investigators33 Questions
Exam 22: Applying Forensic Science to Networks35 Questions
Exam 23: Digital Evidence on the Internet30 Questions
Exam 24: Digital Evidence at the Physical and Data-Link Layers34 Questions
Exam 25: Digital Evidence at the Network and Transport Layers30 Questions
Select questions type
Which of the following tools can reconstruct TCP streams?
Free
(Multiple Choice)
4.7/5
(30)
Correct Answer:
B
What is the maximum cable length for a 10BaseT network?
Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
D
It is necessary to physically tap a network cable to capture the traffic it carries.
Free
(True/False)
4.9/5
(37)
Correct Answer:
False
Although ARP is part of TCP/IP, it is generally considered a part of the _________layer.
(Multiple Choice)
4.9/5
(41)
If a criminal reconfigures his computer with someone else's IP address to conceal his identity, the local router would have an entry in its _________showing that criminal's actual Mac address associated with somebody else's IP address.
(Multiple Choice)
4.8/5
(34)
A common approach to collecting digital evidence from the physical layer is using a sniffer.
(True/False)
4.8/5
(39)
The netstat command can be used to obtain the MAC address of a remote computer.
(True/False)
4.9/5
(30)
The form of ARP that ATM uses to discover MAC addresses is known as:
(Multiple Choice)
4.7/5
(33)
What is the maximum cable length for a 10 base five segment?
(Multiple Choice)
4.9/5
(35)
The best operating system for capturing network traffic on high-speed networks is:
(Multiple Choice)
4.8/5
(34)
Which of the following applications is used to capture network traffic?
(Multiple Choice)
4.7/5
(33)
A computer connected to the Internet via a dial-up modem can eavesdrop on network traffic from other computers that are dialed into the same Internet service provider.
(True/False)
4.8/5
(40)
The transition method in which only one computer can transmit while all the others listen is known as:
(Multiple Choice)
4.7/5
(45)
Each network packet stored in the tcpdump file is date-time stamped.
(True/False)
4.9/5
(37)
Which of the following commands can be used to obtain the MAC address of a remote Windows computer?
(Multiple Choice)
4.9/5
(35)
Showing 1 - 20 of 34
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)