Deck 3: Investigative Techniques and Digital Evidence in Crime Investigations
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/5
Play
Full screen (f)
Deck 3: Investigative Techniques and Digital Evidence in Crime Investigations
1
Security Measures Needed to protect ________ during their transmission
A)file
B)data
C)packet
D)all of above
A)file
B)data
C)packet
D)all of above
data
2
__________ means knowledge obtained from investigation, study , intelligence new ,facts .
A)security
B)data
C)information
D)none of these
A)security
B)data
C)information
D)none of these
information
3
Protection against Denial by one of these parties in a communication refers to?
A)non-repudiation
B)data integrity
C)authentication
D)none of these
A)non-repudiation
B)data integrity
C)authentication
D)none of these
non-repudiation
4
Which One of them is Passive attack?
A)denial of service
B)modify message in transit
C)replay previous message
D)obtain message contain
A)denial of service
B)modify message in transit
C)replay previous message
D)obtain message contain
Unlock Deck
Unlock for access to all 5 flashcards in this deck.
Unlock Deck
k this deck
5
What is lying of IP address called as?
A)ip spoofing
B)ip scamming
C)ip lying
D)none of theses
A)ip spoofing
B)ip scamming
C)ip lying
D)none of theses
Unlock Deck
Unlock for access to all 5 flashcards in this deck.
Unlock Deck
k this deck