Exam 25: Digital Evidence at the Network and Transport Layers
Exam 1: Foundations of Digital Forensics 36 Questions
Exam 2: Language of Computer Crime Investigation33 Questions
Exam 3: Digital Evidence in the Courtroom29 Questions
Exam 4: Cybercrime Law: a United States Perspective30 Questions
Exam 5: Cybercrime Law: a European Perspective30 Questions
Exam 6: Conducting Digital Investigations33 Questions
Exam 7: Handling a Digital Crime Scene32 Questions
Exam 8: Investigative Reconstruction With Digital Evidence32 Questions
Exam 9: Modus Operandi, Motive, and Technology32 Questions
Exam 10: Violent Crime and Digital Evidence30 Questions
Exam 11: Digital Evidence As Alibi18 Questions
Exam 12: Sex Offenders on the Internet31 Questions
Exam 13: Computer Intrusions32 Questions
Exam 14: Cyberstalking31 Questions
Exam 15: Computer Basics for Digital Investigators34 Questions
Exam 16: Applying Forensic Science to Computers31 Questions
Exam 17: Digital Evidence on Windows Systems30 Questions
Exam 18: Digital Evidence on Unix Systems30 Questions
Exam 19: Digital Evidence on Macintosh Systems29 Questions
Exam 20: Digital Evidence on Mobile Devices32 Questions
Exam 21: Network Basics for Digital Investigators33 Questions
Exam 22: Applying Forensic Science to Networks35 Questions
Exam 23: Digital Evidence on the Internet30 Questions
Exam 24: Digital Evidence at the Physical and Data-Link Layers34 Questions
Exam 25: Digital Evidence at the Network and Transport Layers30 Questions
Select questions type
Which of the following logs record the IP addresses of computers accessing an FTP server?
Free
(Multiple Choice)
4.8/5
(29)
Correct Answer:
B
The Internet is a packet-switched network.
Free
(True/False)
4.8/5
(41)
Correct Answer:
True
Which of the following servers maintain logs of when users accessed their e-mail?
(Multiple Choice)
4.9/5
(37)
On a packet-switched network, computers are not connected using dedicated circuits.
(True/False)
4.7/5
(36)
An IP address can only be assigned one name in the Domain Name System.
(True/False)
4.9/5
(37)
Network address translation (NAT) enables many computers to connect to the Internet using only one IP address.
(True/False)
4.9/5
(33)
"dig," which comes installed on UNIX and Windows systems, is a tool used for querying DNS.
(True/False)
4.9/5
(28)
In addition to the IP address of the sender, SMTP e-mail server logs contain which of the following?
(Multiple Choice)
4.9/5
(30)
To make large-scale internetworking more reliable, TCP creates what are called "TCP streams," also known as__________ , to establish, maintain, and terminate connections between hosts.
(Multiple Choice)
4.8/5
(40)
TCP session hijacking can only be performed using a computer on the same network segment as the client and/or server.
(True/False)
4.9/5
(35)
IP address [ 10.40.3.2 ] is a__________ ,__________ network address:
(Multiple Choice)
4.8/5
(27)
RADIUS and TACACS authentication servers keep logs of the IP addresses that were assigned to user accounts connecting to the Internet.
(True/False)
4.9/5
(31)
IP spoofing establishes a bi-directional TCP connection between the attacker's computer and the target.
(True/False)
4.9/5
(31)
Showing 1 - 20 of 30
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)