Exam 25: Digital Evidence at the Network and Transport Layers

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following logs record the IP addresses of computers accessing an FTP server?

Free
(Multiple Choice)
4.8/5
(29)
Correct Answer:
Verified

B

VNC software:

Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
Verified

D

The Internet is a packet-switched network.

Free
(True/False)
4.8/5
(41)
Correct Answer:
Verified

True

Which of the following servers maintain logs of when users accessed their e-mail?

(Multiple Choice)
4.9/5
(37)

On a packet-switched network, computers are not connected using dedicated circuits.

(True/False)
4.7/5
(36)

An IP address can only be assigned one name in the Domain Name System.

(True/False)
4.9/5
(37)

TCP is an abbreviation for:

(Multiple Choice)
4.8/5
(30)

IP Address Class B addresses start with 128.0.0.0 through:

(Multiple Choice)
4.8/5
(35)

Network address translation (NAT) enables many computers to connect to the Internet using only one IP address.

(True/False)
4.9/5
(33)

"dig," which comes installed on UNIX and Windows systems, is a tool used for querying DNS.

(True/False)
4.9/5
(28)

In addition to the IP address of the sender, SMTP e-mail server logs contain which of the following?

(Multiple Choice)
4.9/5
(30)

Which of the following is a Class A network?

(Multiple Choice)
4.8/5
(36)

To make large-scale internetworking more reliable, TCP creates what are called "TCP streams," also known as__________ , to establish, maintain, and terminate connections between hosts.

(Multiple Choice)
4.8/5
(40)

TCP session hijacking can only be performed using a computer on the same network segment as the client and/or server.

(True/False)
4.9/5
(35)

IP address [ 10.40.3.2 ] is a__________ ,__________ network address:

(Multiple Choice)
4.8/5
(27)

Port 80 is generally associated with the Domain Name System.

(True/False)
4.9/5
(31)

RADIUS and TACACS authentication servers keep logs of the IP addresses that were assigned to user accounts connecting to the Internet.

(True/False)
4.9/5
(31)

The command 'dig' stands for 'Digital Information Groper'.

(True/False)
4.7/5
(37)

__________is a tool for querying DNS.

(Multiple Choice)
4.8/5
(30)

IP spoofing establishes a bi-directional TCP connection between the attacker's computer and the target.

(True/False)
4.9/5
(31)
Showing 1 - 20 of 30
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)