Exam 9: Internet and Network Forensics and Intrusion Detection
Exam 1: Forensic Evidence and Crime Investigation40 Questions
Exam 2: Computer Forensics Anddigital Detective Work32 Questions
Exam 3: Tools, Environments, Equipment, and Certifications50 Questions
Exam 4: Policies and Procedures66 Questions
Exam 5: Data, PDA, and Cell Phone Forensics46 Questions
Exam 6: Operating Systems and Data Transmission Basics for Digital Investigations54 Questions
Exam 7: Investigating Windows, linux, and Graphic Files59 Questions
Exam 8: E-Mail and Webmail Forensics49 Questions
Exam 9: Internet and Network Forensics and Intrusion Detection41 Questions
Exam 10: Tracking Down Those Who Intend to Do Harm on a Large Scale40 Questions
Exam 11: Fraud and Forensic Accounting Investigation41 Questions
Exam 12: Federal Rules and Criminal Codes51 Questions
Exam 13: Ethical and Professional Responsibility in Testimony31 Questions
Select questions type
Using an NFAT system,an event or security breach can be
Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
D
Which type of firewall acts as a mediator between internal hosts and external connections such as the Internet?
Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
C
What is considered to be the first line of defense for networks?
Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
B
Which of the following is NOT a component of an NFAT system?
(Multiple Choice)
4.8/5
(41)
________ Software allows you to forensically search for data on your entire network using nothing more than keywords or phrases.
(Short Answer)
4.9/5
(45)
________ have the capability to map internal IP addresses in such a way that they appear to be part of another network.
(Short Answer)
4.7/5
(33)
Match the NFAT components with their description.
-Examiner computer
(Multiple Choice)
4.7/5
(33)
A problem that can occur with IDS alerts is ________,when an IDS mistakenly flags an innocent file as being suspicious.
(Short Answer)
4.9/5
(35)
Which of the following is considered the BEST answer in defining DHCP?
(Multiple Choice)
4.9/5
(34)
_______ Software has taken steps to preserve the integrity of the data collected from the agents via encryption both from agent to server and from the examiner's station to server.
(Short Answer)
4.9/5
(40)
Determining the date and time of an event can be a problem with multiple devices on a network because
(Multiple Choice)
4.8/5
(40)
Match the NFAT components with their description.
Premises:
Agents
Responses:
Modules installed on hosts
Contains a large database
Where the analysis is performed
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(31)
What device holds two network interface cards and records all data passing through it?
(Multiple Choice)
4.9/5
(31)
What is designed to collect data straight from the network media?
(Multiple Choice)
4.8/5
(32)
NFAT tools discussed in this chapter include all of the following features EXCEPT
(Multiple Choice)
4.9/5
(39)
Showing 1 - 20 of 41
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)