Exam 24: Digital Evidence at the Physical and Data-Link Layers

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following tools can reconstruct TCP streams?

Free
(Multiple Choice)
4.7/5
(30)
Correct Answer:
Verified

B

What is the maximum cable length for a 10BaseT network?

Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
Verified

D

It is necessary to physically tap a network cable to capture the traffic it carries.

Free
(True/False)
4.9/5
(37)
Correct Answer:
Verified

False

Although ARP is part of TCP/IP, it is generally considered a part of the _________layer.

(Multiple Choice)
4.9/5
(41)

What information is contained in the padding of an Ethernet frame?

(Essay)
4.9/5
(27)

If a criminal reconfigures his computer with someone else's IP address to conceal his identity, the local router would have an entry in its _________showing that criminal's actual Mac address associated with somebody else's IP address.

(Multiple Choice)
4.8/5
(34)

MAC addresses can be associated with a particular computer.

(True/False)
4.9/5
(30)

A common approach to collecting digital evidence from the physical layer is using a sniffer.

(True/False)
4.8/5
(39)

The netstat command can be used to obtain the MAC address of a remote computer.

(True/False)
4.9/5
(30)

The form of ARP that ATM uses to discover MAC addresses is known as:

(Multiple Choice)
4.7/5
(33)

What is the maximum cable length for a 10 base five segment?

(Multiple Choice)
4.9/5
(35)

ARP stands for:

(Multiple Choice)
4.9/5
(30)

The best operating system for capturing network traffic on high-speed networks is:

(Multiple Choice)
4.8/5
(34)

Which of the following applications is used to capture network traffic?

(Multiple Choice)
4.7/5
(33)

Unlike ARP cache, ATMARP is stored on the individual computers.

(True/False)
4.8/5
(39)

A computer connected to the Internet via a dial-up modem can eavesdrop on network traffic from other computers that are dialed into the same Internet service provider.

(True/False)
4.8/5
(40)

The transition method in which only one computer can transmit while all the others listen is known as:

(Multiple Choice)
4.7/5
(45)

The tcpdump application can be used to reconstruct TCP streams.

(True/False)
4.9/5
(33)

Each network packet stored in the tcpdump file is date-time stamped.

(True/False)
4.9/5
(37)

Which of the following commands can be used to obtain the MAC address of a remote Windows computer?

(Multiple Choice)
4.9/5
(35)
Showing 1 - 20 of 34
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)