Deck 24: Digital Evidence at the Physical and Data-Link Layers

Full screen (f)
exit full mode
Question
Sniffers put NICs into_________ , forcing them to listen in on all of the communications that are occurring on the network.

A) Covert mode
B) Wiretap mode
C) Promiscuous mode
D) None of the above
Use Space or
up arrow
down arrow
to flip the card.
Question
How many bytes per packet does tcpdump capture by default?

A) 10 bytes
B) 68 bytes
C) 128 bytes
D) 1024 bytes
Question
What is the maximum cable length for a 10BaseT network?

A) 10 feet
B) 100 feet
C) 10 meters
D) 100 meters
Question
What is the approximate theoretical maximum number of bytes that can be downloaded in one minute on a 10BaseT network?

A) 10 Mb
B) 75 Mb
C) 100 Mb
D) 175 Mb
Question
The netstat command can be used to obtain the MAC address of a remote computer.
Question
Which of the following applications is used to capture network traffic?

A) Snort
B) Wireshark
C) Tcpdump
D) All of the above
Question
The transition method in which only one computer can transmit while all the others listen is known as:

A) Baseband
B) Narrowband
C) Broadband
D) Sideband
Question
It is necessary to physically tap a network cable to capture the traffic it carries.
Question
If a criminal reconfigures his computer with someone else's IP address to conceal his identity, the local router would have an entry in its _________showing that criminal's actual Mac address associated with somebody else's IP address.

A) Host table
B) BOOTP
C) CMOS
D) ARP table
Question
ARP stands for:

A) Address Resource Protection
B) Advanced Retrieval Protocol
C) Address Resolution Protocol
D) Added Resource Processing
Question
Each network packet stored in the tcpdump file is date-time stamped.
Question
The best operating system for capturing network traffic on high-speed networks is:

A) Microsoft DOS/Windows
B) OpenBSD/FreeBSD
C) Linux
D) Solaris
Question
Although ARP is part of TCP/IP, it is generally considered a part of the _________layer.

A) Physical
B) Data-link
C) Network
D) Transport
Question
Which of the following commands can be used to obtain the MAC address of a remote Windows computer?

A) Netstat
B) Ping
C) Nbtstat
D) Traceroute
Question
Which of the following tools can reconstruct TCP streams?

A) Tcpdump
B) Wireshark
C) Snoop
D) EnCase
Question
Which of the following is a valid MAC address?

A) 192.168.0.5
B) 00:10:4b:de:fc:e9
C) 0-0-e2-7a-c3-5b-6f
D) 08-00-56-s7-fd-d4
Question
MAC addresses can be associated with a particular computer.
Question
The form of ARP that ATM uses to discover MAC addresses is known as:

A) ARPATM
B) ATMARP
C) MACATM
D) ATMMAC
Question
What is the maximum cable length for a 10 base five segment?

A) 100 feet
B) 500 feet
C) 100 m
D) 500 m
Question
Routers use Ethernet addresses to direct data between networks.
Question
It is not possible to use a sniffer when connected to a network via a modem.
Question
A common approach to collecting digital evidence from the physical layer is using a sniffer.
Question
Obtain the MAC address of a computer and describe how you did it.
Question
One of the drawbacks of copying network traffic using a SPANned port is that a
SPANned port copies only valid Ethernet packets.
Question
The tcpdump application can be used to reconstruct TCP streams.
Question
A computer connected to the Internet via a dial-up modem can eavesdrop on network traffic from other computers that are dialed into the same Internet service provider.
Question
Describe how a computer obtains the Ethernet address of another computer that it wants to communicate with.
Question
Unlike ARP cache, ATMARP is stored on the individual computers.
Question
DHCP can be configured to assign a static IP address to a particular computer every time it is connected to the network.
Question
By default, tcpdump captures the entire contents of a packet.
Question
What is a "gratuitous ARP request" and why is it dangerous?
Question
One key point about MAC addresses is that they do not go beyond the router.
Question
What information is contained in the padding of an Ethernet frame?
Question
It is possible to obtain file names from network traffic as well as the file contents.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/34
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 24: Digital Evidence at the Physical and Data-Link Layers
1
Sniffers put NICs into_________ , forcing them to listen in on all of the communications that are occurring on the network.

A) Covert mode
B) Wiretap mode
C) Promiscuous mode
D) None of the above
Promiscuous mode
2
How many bytes per packet does tcpdump capture by default?

A) 10 bytes
B) 68 bytes
C) 128 bytes
D) 1024 bytes
B
3
What is the maximum cable length for a 10BaseT network?

A) 10 feet
B) 100 feet
C) 10 meters
D) 100 meters
D
4
What is the approximate theoretical maximum number of bytes that can be downloaded in one minute on a 10BaseT network?

A) 10 Mb
B) 75 Mb
C) 100 Mb
D) 175 Mb
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
5
The netstat command can be used to obtain the MAC address of a remote computer.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following applications is used to capture network traffic?

A) Snort
B) Wireshark
C) Tcpdump
D) All of the above
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
7
The transition method in which only one computer can transmit while all the others listen is known as:

A) Baseband
B) Narrowband
C) Broadband
D) Sideband
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
8
It is necessary to physically tap a network cable to capture the traffic it carries.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
9
If a criminal reconfigures his computer with someone else's IP address to conceal his identity, the local router would have an entry in its _________showing that criminal's actual Mac address associated with somebody else's IP address.

A) Host table
B) BOOTP
C) CMOS
D) ARP table
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
10
ARP stands for:

A) Address Resource Protection
B) Advanced Retrieval Protocol
C) Address Resolution Protocol
D) Added Resource Processing
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
11
Each network packet stored in the tcpdump file is date-time stamped.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
12
The best operating system for capturing network traffic on high-speed networks is:

A) Microsoft DOS/Windows
B) OpenBSD/FreeBSD
C) Linux
D) Solaris
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
13
Although ARP is part of TCP/IP, it is generally considered a part of the _________layer.

A) Physical
B) Data-link
C) Network
D) Transport
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following commands can be used to obtain the MAC address of a remote Windows computer?

A) Netstat
B) Ping
C) Nbtstat
D) Traceroute
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following tools can reconstruct TCP streams?

A) Tcpdump
B) Wireshark
C) Snoop
D) EnCase
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
16
Which of the following is a valid MAC address?

A) 192.168.0.5
B) 00:10:4b:de:fc:e9
C) 0-0-e2-7a-c3-5b-6f
D) 08-00-56-s7-fd-d4
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
17
MAC addresses can be associated with a particular computer.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
18
The form of ARP that ATM uses to discover MAC addresses is known as:

A) ARPATM
B) ATMARP
C) MACATM
D) ATMMAC
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
19
What is the maximum cable length for a 10 base five segment?

A) 100 feet
B) 500 feet
C) 100 m
D) 500 m
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
20
Routers use Ethernet addresses to direct data between networks.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
21
It is not possible to use a sniffer when connected to a network via a modem.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
22
A common approach to collecting digital evidence from the physical layer is using a sniffer.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
23
Obtain the MAC address of a computer and describe how you did it.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
24
One of the drawbacks of copying network traffic using a SPANned port is that a
SPANned port copies only valid Ethernet packets.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
25
The tcpdump application can be used to reconstruct TCP streams.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
26
A computer connected to the Internet via a dial-up modem can eavesdrop on network traffic from other computers that are dialed into the same Internet service provider.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
27
Describe how a computer obtains the Ethernet address of another computer that it wants to communicate with.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
28
Unlike ARP cache, ATMARP is stored on the individual computers.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
29
DHCP can be configured to assign a static IP address to a particular computer every time it is connected to the network.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
30
By default, tcpdump captures the entire contents of a packet.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
31
What is a "gratuitous ARP request" and why is it dangerous?
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
32
One key point about MAC addresses is that they do not go beyond the router.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
33
What information is contained in the padding of an Ethernet frame?
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
34
It is possible to obtain file names from network traffic as well as the file contents.
Unlock Deck
Unlock for access to all 34 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 34 flashcards in this deck.