CCSI460 CCSI460 Digital Forensics II with Lab week 4 quiz
CCSI460 Digital Forensics II with Lab
Week 4 Quiz
Question 1
(TCO 5) The proces of
ensuring access is maintained and hidden from administration.
Reconnaissance
Attack
Entrenchment
Abuse
Question 2
(TCO 4,7) Fat16 is
limited to what size partition?
1GB
2GB
1TB
Limited only by
drive size
Question 3
(TCO 4,7) Marking
wireless networks by marking the sidewalk with a symbol describes what?
War driving
CSMA/CA
Wireless site survey
War chalking
Question 4
(TCO 4) Cellular
devices contain two unique numbers for the cellular network: a phone number and
MAC address.
CDMA.
ESN.
CDPD.
Question 5
(TCO 4) This file
format is the de facto format for capture network traffic.
Libpcap
Ntlast
.mon
Log.network
Question 6
(TCO 2, 7) This will
reveal the owner of a website along with registration information.
Whois
ICANN database
Usenet
Nslookup
Question 7
(TCO 4) You have
identified a suspect’s MAC address and realized their prefix belongs to 0001E6.
What type of laptop should you look for?
Dell
IBM
HP
3COM
Question 8
(TCO 4) You want to
view all names to IP translations on a network sniffer. What protocol should
you filter on?
ARP
DHCP
DNS
PING
Question 9
(TCO 1) This part of
the packet is used to verify that a packet has not been modified/damaged in
transit.
UDP Source Port
TCP Connection
Check Sum
Padding
Question 10
(TCO 1) This log file
would show any failed logins in Linux.
Syslog
Loginlog
Lastlog
Authlog