Deck 25: Digital Evidence at the Network and Transport Layers

Full screen (f)
exit full mode
Question
The IP software on each__________ contains a routing table that is used to determine where to send information.

A) Host
B) Server
C) Router
D) Switch
Use Space or
up arrow
down arrow
to flip the card.
Question
In addition to the IP address of the sender, SMTP e-mail server logs contain which of the following?

A) The Message ID
B) The time the message was received
C) The name of the sender
D) All of the above
Question
Which of the following logs record the IP addresses of computers accessing an FTP server?

A) Wtmp
B) Xferlog
C) Syslog
D) Access log
Question
What system is used to convert IP addresses to their associated names?

A) TCP/IP
B) DNS
C) ARP
D) Routing
Question
Which of the following is a Class A network?

A) 15.0.0.0
B) 145.19.0.0
C) 199.54.63.0
D) All of the above
Question
It is sometimes possible to obtain a list of all machines in the DNS belonging to a specific organization by performing a ___________.

A) Web crawl
B) Zone transfer
C) Reverse IP
D) IP transfer
Question
TCP is an abbreviation for:

A) Transit Communication Protocol
B) Transportation Cost Product
C) Transport Control Protocol
D) Time Communication Protocol
Question
The UDP protocol will resend packets that were not received by the destination computer.
Question
To make large-scale internetworking more reliable, TCP creates what are called "TCP streams," also known as__________ , to establish, maintain, and terminate connections between hosts.

A) Virtual circuits
B) Dedicated circuits
C) Temporary circuits
D) Parallel circuits
Question
Port 80 is generally associated with the Domain Name System.
Question
TCP session hijacking can only be performed using a computer on the same network segment as the client and/or server.
Question
The creator of the first Internet worm and one of the first individuals to be prosecuted under the Computer Fraud and Abuse Act was:

A) Captain Crunch
B) Scott Tyree
C) Richard Morris Jr.
D) Kevin Mitnick
Question
The Domain Name System can be used to obtain the names of people who are responsible for a given computer.
Question
Which of the following servers maintain logs of when users accessed their e-mail?

A) SMTP
B) Imapd
C) Sendmail
D) All of the above
Question
What protocol does the "ping" command use?

A) TCP
B) IP
C) ICMP
D) All of the above
Question
IP Address Class B addresses start with 128.0.0.0 through:

A) 176.0.0.0
B) 191.0.0.0
C) 192.0.0.0
D) 254.0.0.0
Question
IP address [ 10.40.3.2 ] is a__________ ,__________ network address:

A) Class A, Public
B) Class B, Public
C) Class A, Private
D) Class B, Private
Question
VNC software:

A) Permits full remote control of a computer
B) Has legitimate uses such as remote system administration.
C) Can be used by computer intruders
D) All of the above
Question
__________is a tool for querying DNS.

A) nslookup
B) ping
C) tracert
D) nmap
Question
The Internet is a packet-switched network.
Question
RADIUS and TACACS authentication servers keep logs of the IP addresses that were assigned to user accounts connecting to the Internet.
Question
Any host, even a personal computer in someone's home, can function as a server on the Internet.
Question
All servers keep logs of the IP addresses of clients that connected to them.
Question
It is sometimes possible to obtain a list of all machines in the DNS belonging to a specific organization by performing a zone transfer.
Question
IP spoofing establishes a bi-directional TCP connection between the attacker's computer and the target.
Question
On a packet-switched network, computers are not connected using dedicated circuits.
Question
The command 'dig' stands for 'Digital Information Groper'.
Question
Network address translation (NAT) enables many computers to connect to the Internet using only one IP address.
Question
An IP address can only be assigned one name in the Domain Name System.
Question
"dig," which comes installed on UNIX and Windows systems, is a tool used for querying DNS.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/30
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 25: Digital Evidence at the Network and Transport Layers
1
The IP software on each__________ contains a routing table that is used to determine where to send information.

A) Host
B) Server
C) Router
D) Switch
Router
2
In addition to the IP address of the sender, SMTP e-mail server logs contain which of the following?

A) The Message ID
B) The time the message was received
C) The name of the sender
D) All of the above
D
3
Which of the following logs record the IP addresses of computers accessing an FTP server?

A) Wtmp
B) Xferlog
C) Syslog
D) Access log
B
4
What system is used to convert IP addresses to their associated names?

A) TCP/IP
B) DNS
C) ARP
D) Routing
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following is a Class A network?

A) 15.0.0.0
B) 145.19.0.0
C) 199.54.63.0
D) All of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
6
It is sometimes possible to obtain a list of all machines in the DNS belonging to a specific organization by performing a ___________.

A) Web crawl
B) Zone transfer
C) Reverse IP
D) IP transfer
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
7
TCP is an abbreviation for:

A) Transit Communication Protocol
B) Transportation Cost Product
C) Transport Control Protocol
D) Time Communication Protocol
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
8
The UDP protocol will resend packets that were not received by the destination computer.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
9
To make large-scale internetworking more reliable, TCP creates what are called "TCP streams," also known as__________ , to establish, maintain, and terminate connections between hosts.

A) Virtual circuits
B) Dedicated circuits
C) Temporary circuits
D) Parallel circuits
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
10
Port 80 is generally associated with the Domain Name System.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
11
TCP session hijacking can only be performed using a computer on the same network segment as the client and/or server.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
12
The creator of the first Internet worm and one of the first individuals to be prosecuted under the Computer Fraud and Abuse Act was:

A) Captain Crunch
B) Scott Tyree
C) Richard Morris Jr.
D) Kevin Mitnick
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
13
The Domain Name System can be used to obtain the names of people who are responsible for a given computer.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following servers maintain logs of when users accessed their e-mail?

A) SMTP
B) Imapd
C) Sendmail
D) All of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
15
What protocol does the "ping" command use?

A) TCP
B) IP
C) ICMP
D) All of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
16
IP Address Class B addresses start with 128.0.0.0 through:

A) 176.0.0.0
B) 191.0.0.0
C) 192.0.0.0
D) 254.0.0.0
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
17
IP address [ 10.40.3.2 ] is a__________ ,__________ network address:

A) Class A, Public
B) Class B, Public
C) Class A, Private
D) Class B, Private
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
18
VNC software:

A) Permits full remote control of a computer
B) Has legitimate uses such as remote system administration.
C) Can be used by computer intruders
D) All of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
19
__________is a tool for querying DNS.

A) nslookup
B) ping
C) tracert
D) nmap
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
20
The Internet is a packet-switched network.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
21
RADIUS and TACACS authentication servers keep logs of the IP addresses that were assigned to user accounts connecting to the Internet.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
22
Any host, even a personal computer in someone's home, can function as a server on the Internet.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
23
All servers keep logs of the IP addresses of clients that connected to them.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
24
It is sometimes possible to obtain a list of all machines in the DNS belonging to a specific organization by performing a zone transfer.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
25
IP spoofing establishes a bi-directional TCP connection between the attacker's computer and the target.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
26
On a packet-switched network, computers are not connected using dedicated circuits.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
27
The command 'dig' stands for 'Digital Information Groper'.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
28
Network address translation (NAT) enables many computers to connect to the Internet using only one IP address.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
29
An IP address can only be assigned one name in the Domain Name System.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
30
"dig," which comes installed on UNIX and Windows systems, is a tool used for querying DNS.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 30 flashcards in this deck.