

Network Security Final Exam
Course Introduction
Network Security explores the principles and practices of protecting information and resources across computer networks. The course covers fundamental concepts such as cryptography, authentication, firewalls, intrusion detection and prevention systems, virtual private networks (VPNs), and secure protocols. Students examine common threats and vulnerabilities, attack methodologies, risk management, and policy development. Through case studies and practical exercises, participants will gain hands-on experience in designing and implementing security solutions to safeguard data integrity, confidentiality, and availability within local and wide-area network environments.
Recommended Textbook
Guide to Computer Forensics and Investigations 4th Edition by Bill Nelson
Available Study Resources on Quizplus
16 Chapters
768 Verified Questions
768 Flashcards
Source URL: https://quizplus.com/study-set/1690

Page 2

Chapter 1: Computer Forensics and Investigations As a Profession
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/33478
Sample Questions
Q1) Mention examples of groups that should have direct authority to request computer investigations in the corporate environment.
Answer: Examples of groups that should have direct authority to request computer investigations in the corporate environment include the following:
* Corporate Security Investigations
* Corporate Ethics Office
* Corporate Equal Employment Opportunity Office
* Internal Auditing
* The general counsel or Legal Department
Q2) When you work in the ____________________ group, you test and verify the integrity of standalone workstations and network servers.
Answer: vulnerability assessment and risk management
Q3) The law of search and seizure protects the rights of all people, excluding people suspected of crimes.
A)True
B)False
Answer: False
To view all questions and flashcards with answers, click on the resource link above.
Page 3

Chapter 2: Understanding Computer Investigations
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/33479
Sample Questions
Q1) In any computing investigation, you should be able to repeat the steps you took and produce the same results. This capability is referred to as ____.
A) checked values
B) verification
C) evidence backup
D) repeatable findings
Answer: D
Q2) an older computer forensics tool
A)FTK's Internet Keyword Search
B)Data recovery
C)Free space
D)Interrogation
E)Forensic workstation
F)Norton DiskEdit
G)MS-DOS 6.22
H)Multi-evidence form
I)Self-evaluation
Answer: F
Q3) A(n) ____________________ lists each piece of evidence on a separate page. Answer: single-evidence form
To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: The Investigators Office and Laboratory
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/33480
Sample Questions
Q1) ____ are generated at the federal, state, and local levels to show the types and frequency of crimes committed.
A) HTCN reports
B) IDE reports
C) Uniform crime reports
D) ASCLD reports
Answer: C
Q2) One way to investigate older and unusual computing systems is to keep track of ____ that still use these systems.
A) AICIS lists
B) uniform reports
C) SIGs
D) Minix
Answer: C
Q3) Requirements for taking the EnCE certification exam depend on taking the Guidance Software EnCase training courses.
A)True
B)False
Answer: False
To view all questions and flashcards with answers, click on the resource link above.
Page 5

Chapter 4: Data Acquisition
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/33481
Sample Questions
Q1) What are the considerations you should have when deciding what data-acquisition method to use on your investigation?
Q2) SnapBack DatArrest can perform a data copy of an evidence drive in ____ ways.
A) two
B) three
C) four
D) five
Q3) The ____ command displays pages from the online help manual for information on Linux commands and their options.
A) cmd
B) hlp
C) inst
D) man
Q4) The most common and flexible data-acquisition method is ____.
A) Disk-to-disk copy
B) Disk-to-network copy
C) Disk-to-image file copy
D) Sparse data copy
Q5) What are the advantages and disadvantages of using raw data acquisition format?
Q6) What are some of the design goals of AFF?
To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Processing Crime and Incident Scenes
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/33482
Sample Questions
Q1) ____ records are data the system maintains, such as system log files and proxy server logs.
A) Computer-generated
B) Business
C) Computer-stored
D) Hearsay
Q2) you should rely on this when dealing with a terrorist attack
A)Innocent information
B)AFIS
C)EnCase Enterprise Edition
D)FOIA
E)IOCE
F)Low-level investigations
G)Hearsay
H)Spector
I)HAZMAT
Q3) A judge can exclude evidence obtained from a poorly worded warrant.
A)True
B)False
Q4) How can you determine who is in charge of an investigation?
To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Working With Windows and Dos Systems
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/33483
Sample Questions
Q1) On Windows and DOS computer systems, the ____________________ stores information about partitions on a disk and their locations, size, and other important items.
Q2) ____________________ refers to a disk's structure of platters, tracks, and sectors.
Q3) Briefly explain NTFS compressed files.
Q4) Microsoft's move toward a journaling file system
A)File system
B)Tracks
C)Track density
D)Partition gap
E)Drive slack
F)NTFS
G)Unicode
H)Data streams
I)BitLocker
Q5) What are some of the features offered by current whole disk encryption tools?
Q6) What are BitLocker's current hardware and software requirements?
Q7) What are some of the components of a disk drive?
Q8) Summarize the evolution of FAT versions.
To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Current Computer Forensics Tools
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/33484
Sample Questions
Q1) In general, forensics workstations can be divided into ____ categories.
A) 2
B) 3
C) 4
D) 5
Q2) Although a disk editor gives you the most flexibility in ____, it might not be capable of examining a ____ file's contents.
A) testing, compressed
B) scanning, text
C) testing, pdf
D) testing, doc
Q3) Illustrate the use of a write-blocker on a Windows environment.
Q4) Explain the validation of evidence data process.
Q5) Many vendors have developed write-blocking devices that connect to a computer through FireWire,____ 2.0,and SCSI controllers.
A) USB
B) IDE
C) LCD
D) PCMCIA
To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Macintosh and Linux Boot Processes and File Systems
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/33485
Sample Questions
Q1) ____________________ is a journaling version of Ext2fs that reduces file recovery time after a crash.
Q2) LILO uses a configuration file named ____ located in the /Etc directory.
A) Lilo.conf
B) Boot.conf
C) Lilo.config
D) Boot.config
Q3) GPL and BSD variations are examples of open-source software.
A)True
B)False
Q4) Write a brief history of SCSI.
Q5) On older Macintosh OSs all information about the volume is stored in the ____.
A) Master Directory Block (MDB)
B) Volume Control Block (VCB)
C) Extents Overflow File (EOF)
D) Volume Bitmap (VB)
Q6) The Macintosh file system has ____________________ descriptors for the end of file (EOF).
Q7) CD players that are 12X or faster read discs by using a(n) _____________________ system. Page 10
To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 9: Computer Forensics Analysis and Validation
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/33486
Sample Questions
Q1) How should you approach a case in which an employee is suspected of industrial espionage?
Q2) AccessData ____ compares known file hash values to files on your evidence drive or image files to see whether they contain suspicious data.
A) KFF
B) PKFT
C) NTI
D) NSRL
Q3) A nonsteganographic graphics file has a different size than an identical steganographic graphics file.
A)True
B)False
Q4) To generate reports with the FTK ReportWizard, first you need to ____________________ files during an examination.
Q5) What are the file systems supported by FTK for forensic analysis?
Q6) For most law-enforcement-related computing investigations, the investigator is limited to working with data defined in the search ____________________.
Q7) Briefly describe how to use steganography for creating digital watermarks.
Page 12
To view all questions and flashcards with answers, click on the resource link above.

Chapter 10: Recovering Graphics Files
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/33487
Sample Questions
Q1) ____ images store graphics information as grids of individual pixels.
A) Bitmap
B) Raster
C) Vector
D) Metafiles
Q2) If a graphics file is fragmented across areas on a disk, first you must recover all the fragments to re-create the file.
A)True
B)False
Q3) combinations of bitmap and vector images
A)Pixels
B)Hex Workshop
C)Adobe Illustrator
D)Microsoft Office Picture Manager
E)JPEG
F)Steganalysis tools
G)GIMP
H)XIF
I)Metafile graphics
Q4) Explain how steganalysis tools work.
To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 11: Virtual Machines, Network Forensics, and Live Acquisitions
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/33488
Sample Questions
Q1) helps manage snort rules so that you can specify what items to ignore as regular traffic and what items should raise alarms
A)Cyberforensics
B)Ethereal
C)Tripwire
D)PsGetSid
E)PsLoggedOn
F)Trojan horse
G)Knoppix
H)PsShutdown
I)oinkmaster
Q2) When are live acquisitions useful?
Q3) The ____ Project was developed to make information widely available in an attempt to thwart Internet and network hackers.
A) Honeynet
B) Honeypot
C) Honeywall
D) Honeyweb
Q4) What are some of the tools included with Knoppix STD?
To view all questions and flashcards with answers, click on the resource link above. Page 14

Chapter 12: E-Mail Investigations
Available Study Resources on Quizplus for this Chatper
48 Verified Questions
48 Flashcards
Source URL: https://quizplus.com/quiz/33489
Sample Questions
Q1) GroupWise has ____ ways of organizing the mailboxes on the server.
A) 2
B) 3
C) 4
D) 5
Q2) The Novell e-mail server software is called ____.
A) Sendmail
B) GroupWise
C) Sawmill
D) Guardian
Q3) Some e-mail systems store messages in flat plaintext files, known as a(n) ____ format.
A) POP3
B) mbox
C) MIME
D) SMTP
Q4) Administrators usually set e-mail servers to ____________________ logging mode.
Q5) In UNIX e-mail servers, the ____________________ file simply specifies where to save different types of e-mail log files.
Q6) What are the steps for viewing e-mail headers in Hotmail?
To view all questions and flashcards with answers, click on the resource link above. Page 15

Chapter 13: Cell Phone and Mobile Device Forensics
Available Study Resources on Quizplus for this Chatper
37 Verified Questions
37 Flashcards
Source URL: https://quizplus.com/quiz/33490
Sample Questions
Q1) The file system for a SIM card is a ____ structure.
A) volatile
B) circular
C) hierarchical
D) linear
Q2) What is the general procedure to access the content on a mobile phone SIM card?
Q3) Identify several uses of SIM cards.
Q4) Many people store more information on their cell phones than they do on their computers.
A)True
B)False
Q5) Investigating cell phones and mobile devices is a relatively easy task in digital forensics.
A)True
B)False
Q6) Portability of information is what makes SIM cards so versatile.
A)True
B)False
Q7) Mobile devices can range from simple phones to small computers, also called
To view all questions and flashcards with answers, click on the resource link above. Page 16

Chapter 14: Report Writing for High-Tech Investigations
Available Study Resources on Quizplus for this Chatper
48 Verified Questions
48 Flashcards
Source URL: https://quizplus.com/quiz/33491
Sample Questions
Q1) Remember that anything you write down as part of your examination for a report is subject to ____ from the opposing attorney.
A) subpoena
B) discovery
C) publishing
D) deposition
Q2) The ______________________________ system is frequently used when writing pleadings.
Q3) What do you need to consider to produce clear, concise reports?
Q4) A(n) ____ is sworn to under oath (and penalty of perjury or comparable false swearing statute).
A) written report
B) verbal report
C) examination plan
D) cross-examination report
Q5) What are the areas of investigation usually addressed by a verbal report?
Q6) Besides presenting facts, reports can communicate expert opinion.
A)True
B)False
Q7) Explain how to use supportive material on a report.
To view all questions and flashcards with answers, click on the resource link above. Page 17

Chapter 15: Expert Testimony in High-Tech Investigations
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/33492
Sample Questions
Q1) What should you do when you find exculpatory evidence?
Q2) a hashing algorithm
A)Plaintiff
B)Motion in limine
C)Voir dire of venireman
D)Opening statements
E)Discovery deposition
F)CV
G)Testimony preservation deposition
H)Voir dire
I)MD5
Q3) Generally, the best approach your attorney can take in direct examination is to ask you ____ questions and let you give your testimony.
A) setup
B) open-ended
C) compound
D) rapid-fire
Q4) At a trial, _____________________ are statements that organize the evidence and state the applicable law.
To view all questions and flashcards with answers, click on the resource link above. Page 18

Chapter 16: Ethics for the Expert Witness
Available Study Resources on Quizplus for this Chatper
35 Verified Questions
35 Flashcards
Source URL: https://quizplus.com/quiz/33493
Sample Questions
Q1) The ____ Ethics Code cautions psychologists about the limitations of assessment tools.
A) ABA's
B) APA's
C) AMA's
D) ADA's
Q2) Briefly describe the issues related to an attorney's "opinion shopping."
Q3) _____________________ are standards that others apply to you or that you are compelled to adhere to by external forces, such as licensing bodies.
Q4) one of the effects of violating court rules or laws
A)Ethics
B)Federal Rules of Evidence (FRE)
C)Disqualification
D)IACIS
Q5) FRE ____ describes whether basis for the testimony is adequate.
A) 700
B) 701
C) 702
D) 703
Q6) The ____________________ is the foundation of medical ethics.
Page 19
To view all questions and flashcards with answers, click on the resource link above.