Deck 21: Network Basics for Digital Investigators

Full screen (f)
exit full mode
Question
Ethernet uses which of the following technologies?

A) CDPD
B) CSMA/CD
C) CDMA
D) All of the above
Use Space or
up arrow
down arrow
to flip the card.
Question
Hosts that connect two or more networks are called:

A) Routers
B) Switches
C) Hubs
D) All of the above
Question
It is possible to reconstruct events surrounding a crime scene using only evidence on networks when the subject's hard drive is not available.
Question
Currently, the most widely used Internet protocols are:

A) TCP
B) UDP
C) IP
D) All of the above
Question
TCP connections only carry data in one direction.
Question
A hub joins hosts at the physical level whereas a switch joins them at the__________ layer.

A) Transport
B) Physical
C) Network
D) Data-link
Question
_________is a transport layer protocol.

A) TCP
B) IP
C) HTTP
D) FTP
Question
Which of the following network technologies uses a fiber-optic medium?

A) Ethernet
B) FDDI
C) Asynchronous Transfer Mode
D) 802.11
Question
Which of the following is a Layer 2 address?

A) 00-02-2D-65-C9-83
B) 192.168.9.5
C) 121.19.7.360
D) 1042556
Question
An understanding of networks is only necessary for investigating computer intrusions and Denial Of Service attacks.
Question
When a Windows system connects to a shared folder on another Windows machine on the Internet, which of the following protocols are used?

A) TCP/IP
B) SMB
C) NetBIOS
D) All of the above
Question
Another name for a hub is:

A) Switch
B) Router
C) Concentrator
D) NIC
Question
Ethernet frames are encapsulated within IP datagrams.
Question
The OSI reference model divides Internets into seven layers. Choose the correct order, by layer.

A) Transport, Session, Network, Presentation, Data-link, Application, Physical
B) Presentation, Data-link, Application, Physical, Transport, Session, Network
C) Physical, Data-link, Network, Transport, Session, Presentation, Application
D) Data-link, Network, Session, Application, Physical, Network, Session
Question
An understanding of networks helps with which of the following:

A) Establishing continuity of offense
B) Tracking down offenders
C) Understanding traces of online activities left on a PC
D) All of the above
Question
Which of the following is a wireless protocol?

A) 802.11b
B) 802.11x
C) HyperLAN2
D) All of the above
Question
The layer responsible for managing the delivery of data is the:

A) Application layer
B) Presentation layer
C) Transport layer
D) Session layer
Question
A switch prevents eavesdropping on a network.
Question
Which of the following are Layer 7 protocols?

A) Ethernet
B) HTTP
C) TCP
D) All of the above
Question
The layer that actually carries data via cables or radio signals is the:

A) Transport layer
B) Physical layer
C) Network layer
D) Data-link layer
Question
Child pornographers are connecting to the home networks of innocent individuals via insecure wireless access points. How can this help or hinder a digital investigation?
Question
Air is a network (Layer 3) medium for transmitting data.
Question
In Figure 21.13, identify each layer and describe its purpose.
Question
TCP addresses can be used to track down an offender.
Question
TCP/IP enables computers using different network technologies to communicate.
Question
Capturing network traffic at the physical layer gives investigators access to application layer data such as web pages viewed and images downloaded.
Question
MAC addresses are uniquely associated with an NIC whereas IP addresses can be changed.
Question
Individuals who can access the physical layer have unlimited access to all of the data on the network unless it is encrypted.
Question
Every mobile telephone has a unique Electronic Serial Number (ESN) and Mobile ID Number (MIN).
Question
Give an example of the type of digital evidence that can be found at each layer of the OSI
Question
Mobile telephones can be used to locate the person using them.
Question
A single, prolonged NetBIOS connection can be made up of multiple TCP/IP
connections.
Question
TCP is a Layer 4 protocol.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/33
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 21: Network Basics for Digital Investigators
1
Ethernet uses which of the following technologies?

A) CDPD
B) CSMA/CD
C) CDMA
D) All of the above
B
2
Hosts that connect two or more networks are called:

A) Routers
B) Switches
C) Hubs
D) All of the above
A
3
It is possible to reconstruct events surrounding a crime scene using only evidence on networks when the subject's hard drive is not available.
True
4
Currently, the most widely used Internet protocols are:

A) TCP
B) UDP
C) IP
D) All of the above
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
5
TCP connections only carry data in one direction.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
6
A hub joins hosts at the physical level whereas a switch joins them at the__________ layer.

A) Transport
B) Physical
C) Network
D) Data-link
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
7
_________is a transport layer protocol.

A) TCP
B) IP
C) HTTP
D) FTP
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following network technologies uses a fiber-optic medium?

A) Ethernet
B) FDDI
C) Asynchronous Transfer Mode
D) 802.11
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following is a Layer 2 address?

A) 00-02-2D-65-C9-83
B) 192.168.9.5
C) 121.19.7.360
D) 1042556
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
10
An understanding of networks is only necessary for investigating computer intrusions and Denial Of Service attacks.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
11
When a Windows system connects to a shared folder on another Windows machine on the Internet, which of the following protocols are used?

A) TCP/IP
B) SMB
C) NetBIOS
D) All of the above
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
12
Another name for a hub is:

A) Switch
B) Router
C) Concentrator
D) NIC
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
13
Ethernet frames are encapsulated within IP datagrams.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
14
The OSI reference model divides Internets into seven layers. Choose the correct order, by layer.

A) Transport, Session, Network, Presentation, Data-link, Application, Physical
B) Presentation, Data-link, Application, Physical, Transport, Session, Network
C) Physical, Data-link, Network, Transport, Session, Presentation, Application
D) Data-link, Network, Session, Application, Physical, Network, Session
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
15
An understanding of networks helps with which of the following:

A) Establishing continuity of offense
B) Tracking down offenders
C) Understanding traces of online activities left on a PC
D) All of the above
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
16
Which of the following is a wireless protocol?

A) 802.11b
B) 802.11x
C) HyperLAN2
D) All of the above
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
17
The layer responsible for managing the delivery of data is the:

A) Application layer
B) Presentation layer
C) Transport layer
D) Session layer
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
18
A switch prevents eavesdropping on a network.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following are Layer 7 protocols?

A) Ethernet
B) HTTP
C) TCP
D) All of the above
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
20
The layer that actually carries data via cables or radio signals is the:

A) Transport layer
B) Physical layer
C) Network layer
D) Data-link layer
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
21
Child pornographers are connecting to the home networks of innocent individuals via insecure wireless access points. How can this help or hinder a digital investigation?
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
22
Air is a network (Layer 3) medium for transmitting data.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
23
In Figure 21.13, identify each layer and describe its purpose.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
24
TCP addresses can be used to track down an offender.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
25
TCP/IP enables computers using different network technologies to communicate.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
26
Capturing network traffic at the physical layer gives investigators access to application layer data such as web pages viewed and images downloaded.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
27
MAC addresses are uniquely associated with an NIC whereas IP addresses can be changed.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
28
Individuals who can access the physical layer have unlimited access to all of the data on the network unless it is encrypted.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
29
Every mobile telephone has a unique Electronic Serial Number (ESN) and Mobile ID Number (MIN).
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
30
Give an example of the type of digital evidence that can be found at each layer of the OSI
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
31
Mobile telephones can be used to locate the person using them.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
32
A single, prolonged NetBIOS connection can be made up of multiple TCP/IP
connections.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
33
TCP is a Layer 4 protocol.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 33 flashcards in this deck.