
Digital Forensics Quiz 10
Authored by YL Ho
Computers
University
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
Can determine if a network is truly under attack/a user has installed an untested patch/program
Broadcast forensics
Computer forensics
Network forensics
Traffic forensics
2.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
__hide the most valuable data at the innermost part of the network
Layered network defense strategies
Firewalls
NAT
Protocols
3.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
__forensics is the systematic tracking of incoming & outgoing traffic on your network
Network
Computer
Criminal
Server
4.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
__can be used to create a bootable forensic CD & perform a live acquisition
DTDD
Inquisitor
Helix
Neon
5.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
Helix operates in 2 modes:Windows Live(GUI or command line) &__
command Windows
command Linux
remote GUI
bootable Linux
6.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
A common way of examining network traffic is by running the__program
Netdump
Slackdump
Coredump
Tcpdump
7.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
__is a suite of tools created by Sysinternals
PsTools
EnCase
R-Tools
Knoppix
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?