coursework-banner

CCSI460 CCSI460 Digital Forensics II with Lab week 4 quiz

CCSI460 CCSI460 Digital Forensics II with Lab week 4 quiz

Week_4_Quiz.docx (58.48 KB)

CCSI460 Digital Forensics II with Lab

Week 4 Quiz

Question 1

(TCO 5) The proces of
ensuring access is maintained and hidden from administration.

Reconnaissance

Attack

Entrenchment

Abuse

Question 2

(TCO 4,7) Fat16 is
limited to what size partition?

1GB

2GB

1TB

Limited only by
drive size

Question 3

(TCO 4,7) Marking
wireless networks by marking the sidewalk with a symbol describes what?

War driving

CSMA/CA

Wireless site survey

War chalking

Question 4

(TCO 4) Cellular
devices contain two unique numbers for the cellular network: a phone number and

MAC address.

CDMA.

ESN.

CDPD.

Question 5

(TCO 4) This file
format is the de facto format for capture network traffic.

Libpcap

Ntlast

.mon

Log.network

Question 6

(TCO 2, 7) This will
reveal the owner of a website along with registration information.

Whois

ICANN database

Usenet

Nslookup

Question 7

(TCO 4) You have
identified a suspect’s MAC address and realized their prefix belongs to 0001E6.
What type of laptop should you look for?

Dell

IBM

HP

3COM

Question 8

(TCO 4) You want to
view all names to IP translations on a network sniffer. What protocol should
you filter on?

ARP

DHCP

DNS

PING

Question 9

(TCO 1) This part of
the packet is used to verify that a packet has not been modified/damaged in
transit.

UDP Source Port

TCP Connection

Check Sum

Padding

Question 10

(TCO 1) This log file
would show any failed logins in Linux.

Syslog

Loginlog

Lastlog

Authlog