Network Forensics I Final Exam Review

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Select the number which represents the bit value for "source port" and "destination port" fields in the TCP header. 8 32 16 24 all of the above none of the above

16

Internet Protocol (IP) operates at Layer ______ of the OSI model, which is called the ______ layer.

3; Network

Which of the following are designed to log successful and/or failed login attempts? DHCP Servers Authentication Servers Name Servers all of the above none of the above

Authentication Servers

Which of the following are designed to help security professionals identify and respond to network security incidents? Central Log Servers Application Servers Web Proxies all of the above none of the above

Central Log Servers

The ____ is often used with IP to provide feedback about problems in the communication environment. TCP UDP ICMP all of the above none of the above

ICMP

Which of the Real-World Cases involved leveraging wireless access point logs to pinpoint a time and location? Network Server Desktop Laptop

Laptop

Which of the following may contain logs that reveal connection attempts from internal to external systems? DHCP Servers Authentication Servers Name Servers all of the above none of the above

Name Servers

Which of the following is referred to as a TCP segment? Demultiplexing, TCP header Encapsulation, IP header Demulitplexing, IP header TCP header, encapsulated payload all of the above none of the above

TCP header, encapsulated payload

Network forensic investigators can tap into physical cabling to copy and preserve network traffic as it is transmitted across the line. True False

True

The Real-World Case involving the government server was based on an alert of suspicious files True False

True

Which of the following can be described as the most rudimentary network-based intrusion detection system and the most widely deployed? Wire Air Switches Routers all of the above none of the above

Routers

Which of the following are examples of network-based digital evidence? /var/log/messages browser activity IM sessions emails all of the above all of the above except /var/log/messages none of the above

all of the above

According to the author, we define evidence in the _____ sense as any _____ and _____ event or artifact of an event, that can be used to establish a _____ understanding of the cause and nature of an observed occurrence. restricted, observable, recordable, true broadest, observable, recordable, true largest, observable, recordable, perfect broadest, plain, recordable, true

broadest, observable, recordable, true

Which of the following is evidence that does not directly support a specific conclusion? best evidence real evidence circumstantial evidence hearsay

circumstantial evidence

Which of the following represents the Internet Protocol (IP)? connectionless protocol operates at layer 2 has a method for indicating the initiation of a conversation has a method for indicating the closing of a conversation all of the above none of the above

connectionless protocol

Which of the following is a label given to testimony by someone who was not a direct witness best evidence real evidence circumstantial evidence hearsay

hearsay

Refer to the illustration above and select the layer which represents a frame. layer 1 layer 3 layer 4 layer 7 layer 2

layer 2

Refer to the illustration above and select the layer which represents a source media access control address. layer 3 (left side) layer 1 (right side) layer 1 (left side) layer 2 (right side) layer 2 (left side) layer 3 (right side)

layer 2 (left side)

Refer to the illustration above and select the layer which represents segment. layer 1 layer 3 layer 4 layer 7 layer 2

layer 4

Refer to the illustration above and select the layer which represents the UDP protocol. layer 1 layer 3 layer 4 layer 7 layer 2

layer 4

Refer to the illustration above and select the layer which represents the DNS protocol. layer 1 layer 3 layer 4 layer 7 layer 2

layer 7

Match the tcpdump command-line options. listen on interface do not resolve addresses to names read packets from a pcap file write packets to a pcap file Options: -i -n -r -w

listen on interface: -i do not resolve addresses to names: -n read packets from a pcap file: -r write packets to a pcap file: -w

Which of the following requirements for admissibility are murky, whereas the source of the evidence is not obtainable or cannot be identified? direct records digital evidence network-based digital evidence real evidence

network-based digital evidence

The length of the IP packet is specified in: the footer the source address the destination address all of the above none of the above

none of the above

Write the complete command using "tcpdump" to read the file mypcapfile.pcap, and display the output in three (3) separate columns to show offsets, hexadecimal details, and ASCII details.

tcpdump -nn -AX -r mypcapfile.pcap

Write the complete command for using "tshark" to read the file mypcapfile.pcap

tshark -r mypcapfile.pcap

Write the complete command for using "tshark" to read the file mypcapfile.pcap and print the fields for frame number (frame.number) and IP address (ip.addr).

tshark -r mypcapfile.pcap -T fields -e frame.number -e ip.addr

Write the complete command using "tshark" to read the file mypcapfile.pcap, and include a display filter to show only the IP address (ip.addr) equal to 192.168.1.15.

tshark -r mypcapfile.pcap -f "ip.addr == 192.168.1.15"

Which of the following stores mappings between physical ports and each network interface card's media access control address? Wire Air Switches Routers all of the above none of the above

Switches

TCP is a connectionless-oriented protocol. True False

False

The IP Protocol includes mechanisms to augment end-to-end data reliability. True False

False

The IPv6 protocol was developed with 127 bits for each of the source and destination addresses. True False

False

The Internet Protocol (IP) is designed to ensure reliability of transmission. True False

False

The Internet Protocol (IP) version 4 uses a 32-byte address space to identify the source and destination systems. True False

False

The Real-World Case involving the laptop was based on an alert from a centrally managed intrusion detection system. True False

False

The TCP protocol indicates the state of transmissions using fields in the TCP header. True False

False

The UDP datagram consist of the IP header and the payload. True False

False

The possible values for TCP ports range from 0 to 69,535. True False

False

According to the author network-based evidence is often highly volatile and must be collected "only" through passive means that inherently modify the system. True False

False

Cabling which consist of fiber-optic lines are made of very thin strands of copper. True False

False

Which of the following is NOT a key characteristic of the Internet Protocol (IP)? Support for addressing and routing Connectionless Header plus payload is called a segment Unreliable Includes a header none of the above

Header plus payload is called a segment

Which of the Real-World Cases involved a routine antivirus scan alerting the system administrator of suspicious files? Network Server Desktop Laptop

Server

Which of the following can store the web surfing logs for an entire organization? Central Log Servers Application Servers Web Proxies all of the above none of the above

Web Proxies

Match the SMTP terms with the correct descriptions ____ MX ____ MSA ____ MTA ____ MUA ____ MDA 1.the end-user's mail client 2.handles local mail submission 3.transfers mail between mail servers 4.accepts incoming messages for a domain 5.handles local mail delivery

__4__ MX __2__ MSA __3__ MTA __1__ MUA __5__ MDA


Kaugnay na mga set ng pag-aaral

Clayton's Basic Pharmacology for Nurses Chapter 11

View Set

Test Four Unit 4 Context: Art History

View Set

Chp. 14: Somatosensory Function, Pain, Headache, and Temperature Regulation

View Set

Week 1 Module- Chapter 24 the office environment

View Set

SAUNDERS oncology with pharm ex 2 (145 Q's)

View Set

chapter 3) Life insurance premiums

View Set

Health Services Management and Economics Midterm

View Set

Assignment 1: Introduction to Science and Biology

View Set

Orga_MCQ_Ch6_Specialization and Coordination

View Set