Exam 10: Tracking Down Those Who Intend to Do Harm on a Large Scale
Exam 1: Forensic Evidence and Crime Investigation40 Questions
Exam 2: Computer Forensics Anddigital Detective Work32 Questions
Exam 3: Tools, Environments, Equipment, and Certifications50 Questions
Exam 4: Policies and Procedures66 Questions
Exam 5: Data, PDA, and Cell Phone Forensics46 Questions
Exam 6: Operating Systems and Data Transmission Basics for Digital Investigations54 Questions
Exam 7: Investigating Windows, linux, and Graphic Files59 Questions
Exam 8: E-Mail and Webmail Forensics49 Questions
Exam 9: Internet and Network Forensics and Intrusion Detection41 Questions
Exam 10: Tracking Down Those Who Intend to Do Harm on a Large Scale40 Questions
Exam 11: Fraud and Forensic Accounting Investigation41 Questions
Exam 12: Federal Rules and Criminal Codes51 Questions
Exam 13: Ethical and Professional Responsibility in Testimony31 Questions
Select questions type
Detecting and investigating criminal hacker cases require investigators to
Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
B
Match the virus with its estimated cost damages.
-Code Red
Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
C
Some military experts suggest that our future defense will rely more on __________ officers than on tanks and artillery.
Free
(Short Answer)
4.7/5
(31)
Correct Answer:
intelligence
Which of the following is NOT considered a cyberplanning tool for coordinating and carrying out an agenda?
(Multiple Choice)
4.9/5
(40)
In 2005,authorities described an assault as the heaviest ever perpetrated on another nations computer systems from overseas.What country was being attacked?
(Multiple Choice)
4.8/5
(35)
Place the following steps of a botnet attack into correct order.
-Second
(Multiple Choice)
5.0/5
(33)
From May through June of 2002,the al Qaeda Web site appeared at a Web location in
(Multiple Choice)
4.8/5
(36)
Which of the following is NOT considered a tactic used by hackers to hijack a computer?
(Multiple Choice)
4.8/5
(33)
________ control these computer networks that often are the source of DoS attacks.
(Short Answer)
4.8/5
(34)
Christopher Maxwell began the process of building his network by signing on as an affiliate with several ________ companies who paid him to install their programs on computers.
(Short Answer)
4.9/5
(41)
How many computers was the bot-herder 0x80 said to control?
(Multiple Choice)
4.8/5
(38)
Which of the following was NOT e-evidence used to track the creator of the Melissa virus?
(Multiple Choice)
4.8/5
(38)
Place the following steps of a botnet attack into correct order.
-Fourth
(Multiple Choice)
4.8/5
(36)
Adversaries unable to counter the U.S.military on the battlefield instead exploit military ________.
(Short Answer)
4.7/5
(35)
Investigations into hackers can be difficult because even with a full audit trail showing that a user came from a particular account on a particular ISP,
(Multiple Choice)
4.8/5
(38)
Place the following steps of a botnet attack into correct order.
-First
(Multiple Choice)
4.9/5
(38)
Place the following steps of a botnet attack into correct order.
-Third
(Multiple Choice)
4.9/5
(36)
Showing 1 - 20 of 40
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)