Exam 25: Digital Evidence at the Network and Transport Layers

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

It is sometimes possible to obtain a list of all machines in the DNS belonging to a specific organization by performing a zone transfer.

(True/False)
4.8/5
(36)

The creator of the first Internet worm and one of the first individuals to be prosecuted under the Computer Fraud and Abuse Act was:

(Multiple Choice)
4.8/5
(40)

The Domain Name System can be used to obtain the names of people who are responsible for a given computer.

(True/False)
4.8/5
(31)

The IP software on each__________ contains a routing table that is used to determine where to send information.

(Multiple Choice)
4.9/5
(36)

What system is used to convert IP addresses to their associated names?

(Multiple Choice)
4.7/5
(43)

All servers keep logs of the IP addresses of clients that connected to them.

(True/False)
4.8/5
(25)

The UDP protocol will resend packets that were not received by the destination computer.

(True/False)
4.8/5
(36)

Any host, even a personal computer in someone's home, can function as a server on the Internet.

(True/False)
4.8/5
(38)

It is sometimes possible to obtain a list of all machines in the DNS belonging to a specific organization by performing a ___________.

(Multiple Choice)
4.8/5
(34)

What protocol does the "ping" command use?

(Multiple Choice)
4.7/5
(28)
Showing 21 - 30 of 30
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)