Exam 9: Internet and Network Forensics and Intrusion Detection
Exam 1: Forensic Evidence and Crime Investigation40 Questions
Exam 2: Computer Forensics Anddigital Detective Work32 Questions
Exam 3: Tools, Environments, Equipment, and Certifications50 Questions
Exam 4: Policies and Procedures66 Questions
Exam 5: Data, PDA, and Cell Phone Forensics46 Questions
Exam 6: Operating Systems and Data Transmission Basics for Digital Investigations54 Questions
Exam 7: Investigating Windows, linux, and Graphic Files59 Questions
Exam 8: E-Mail and Webmail Forensics49 Questions
Exam 9: Internet and Network Forensics and Intrusion Detection41 Questions
Exam 10: Tracking Down Those Who Intend to Do Harm on a Large Scale40 Questions
Exam 11: Fraud and Forensic Accounting Investigation41 Questions
Exam 12: Federal Rules and Criminal Codes51 Questions
Exam 13: Ethical and Professional Responsibility in Testimony31 Questions
Select questions type
Match the firewall type with its description.
-Proxy firewall
(Multiple Choice)
4.8/5
(35)
Match the type of analysis with its function or description.
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(38)
A(n)________ is the standard operation procedures of the network when it is running normally.
(Short Answer)
4.9/5
(34)
Match the firewall type with its description.
-Network layer
(Multiple Choice)
4.9/5
(30)
An IDS is considered by most system administrators to be a(n)________ security system.
(Short Answer)
4.9/5
(29)
Software clients called ________ installed on network devices are designed to collect information from the host.
(Short Answer)
5.0/5
(33)
NFAT software can be configured to accept input from almost any device that generates a(n)________ file.
(Short Answer)
4.7/5
(36)
NFAT systems generally require large amounts of storage space,such as a(n)________ system.
(Short Answer)
4.8/5
(42)
Match the firewall type with its description.
-Application layer
(Multiple Choice)
4.8/5
(32)
The ________ is a major source of forensic data in both the stand-alone and network forensic fields.
(Short Answer)
4.8/5
(35)
What is considered as the primary problem associated with enterprise-level IDS tools?
(Multiple Choice)
4.9/5
(33)
________ transmit and receive data via radio frequency in the open.
(Short Answer)
4.9/5
(28)
The generation of logs on devices such as routers,proxies,and firewalls should always be set to the ________ at which your network can operate.
(Short Answer)
4.9/5
(28)
Which of the following data-capture methods uses a filtering system approach?
(Multiple Choice)
4.8/5
(45)
What is considered as the first attempt to address the increasing number of attacks on networks?
(Multiple Choice)
5.0/5
(40)
Identifying situations such as regular spikes in late-night traffic is an example of
(Multiple Choice)
5.0/5
(32)
The feature of modern switches called ________ duplicates the information going into a port to the SPAN port.
(Short Answer)
5.0/5
(47)
A(n)________ repeats all data received on any port to the remaining ports;it is gradually being replaced by switches and SPAN systems.
(Short Answer)
4.8/5
(35)
Showing 21 - 40 of 41
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)