Network Security Review Questions - 600 Verified Questions

Page 1


Network Security Review Questions

Course Introduction

Network Security is a foundational course that explores the principles, methodologies, and technologies used to protect computer networks from unauthorized access, misuse, and attacks. Students learn about core security concepts such as cryptography, authentication, firewalls, intrusion detection and prevention systems, virtual private networks (VPNs), and network protocols. The course also covers risk assessment, security policies, and incident response strategies. Through practical exercises and case studies, students develop the skills necessary to identify vulnerabilities, implement countermeasures, and maintain secure network infrastructures in both enterprise and cloud environments.

Recommended Textbook

Computer Forensics Principles and Practices 1st Edition by Linda Volonino

Available Study Resources on Quizplus

13 Chapters

600 Verified Questions

600 Flashcards

Source URL: https://quizplus.com/study-set/2159 Page 2

Chapter 1: Forensic Evidence and Crime Investigation

Available Study Resources on Quizplus for this Chatper

33 Verified Questions

33 Flashcards

Source URL: https://quizplus.com/quiz/43035

Sample Questions

Q1) What federal program provides computer forensic expertise to law enforcement agencies?

A)The RCFL

B)The NBCD

C)The ACHF

D)The CDCF

Answer: A

Q2) A(n)________ is considered an offensive act against societal laws.

Answer: crime

Q3) Which of the following has the most far-reaching effect for law enforcement concerning cybercrimes?

A)FERPA

B)CFAA

C)CAN-SPAM Act

D)USA PATRIOT Act

Answer: D

Q4) A(n)________ is a lesser crime such as careless driving.

Answer: misdemeanor

Q5) For any item of evidence to be considered admissible,it must first be ________. Answer: authenticated

To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Computer Forensics Anddigital Detective Work

Available Study Resources on Quizplus for this Chatper

28 Verified Questions

28 Flashcards

Source URL: https://quizplus.com/quiz/43036

Sample Questions

Q1) The ________ states that evidence collected in violation of the Fourth Amendment cannot be used in a trial.

Answer: exclusionary rule

Q2) In order to be legally defensible,methods used in the recovery of data must ensure that

A)The original evidence was not altered.

B)No data was added to the original.

C)No data was deleted from the original.

D)All of the above

Answer: D

Q3) ________ is the blending of accounting,auditing,and investigative skills.

Answer: Forensic accounting

Q4) Hackers go after valuable content such as

A)Expensive applications

B)Links to terrorist Web sites

C)Pricing data

D)Malware scripts

Answer: C

Q5) A(n)________ is a reasonable belief that a person has committed a crime.

Answer: probable cause

4

To view all questions and flashcards with answers, click on the resource link above.

Chapter 3: Tools, Environments, Equipment, and Certifications

Available Study Resources on Quizplus for this Chatper

48 Verified Questions

48 Flashcards

Source URL: https://quizplus.com/quiz/43037

Sample Questions

Q1) A computer forensic specialist may examine the ________ to ascertain the true identity of a file.

Answer: file header

Q2) MacQuisition Boot CD

A) Investigates the contents of BlackBerry devices

B) Graphical user interface consists of a series of panes

C) Safely and easily images Mac drives

D) Reads the first 32 bits of a file to identify its type

E) Open-source program that runs on UNIX plattorms

Answer: C

Q3) dtSearch

A) The universal hexadecimal editor

B) Invaluable for combing through large amounts of data

C) Exclusively for Macs

D) AccessData tool designed for finding and examining evidence

E) Primarily for computer crime investigators

Answer: B

Page 5

To view all questions and flashcards with answers, click on the resource link above.

Chapter 4: Policies and Procedures

Available Study Resources on Quizplus for this Chatper

63 Verified Questions

63 Flashcards

Source URL: https://quizplus.com/quiz/43038

Sample Questions

Q1) You can use ________ analysis to eliminate common files by comparing them to the same files on your system.

Q2) External USB drive

A)Useful for transferring large amounts of data or images

B)Necessary if there are no convenient plugs

C)Startup disks, CDs, or USB drives

D)Used to keep notes or upload photographs

E)Screwdrivers, pliers, duct tape

Q3) Include a(n)________ as part of your forensic equipment because it allows you to carry a library of forensic tools and can give you access to the Internet.

Q4) Estimation of time

A)How long will an on-site examination last?

B)Will the investigation cause financial hardships?

C)How volatile is the evidence?

D)Is the equipment impractical?

E)Is this to be done on-site or in the lab?

Q5) With the original evidence safely stored,you should make a(n)________ of the forensic image.

Q6) The main reason for file compression is to ________.

Page 6

To view all questions and flashcards with answers, click on the resource link above.

Chapter 5: Data, PDA, and Cell Phone Forensics

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/43039

Sample Questions

Q1) Most recent ZIP drives can handle up to what amount of data?

A)500GB

B)1GB

C)750MB

D)120MB

Q2) Paraben software

A)Considered to be the gold standard

B)Highly regarded and able to generate detailed reports

C)Considered most reliable for hardware

D)Has Faraday bags

Q3) One excellent feature of ________ is that this software can crack Palm passwords.

Q4) The simple rule for powering down equipment is that you pull the plug on everything but ________.

Q5) GSMXRY

A)CDMA phones

B)GSM phones

C)Supports GSM and TDMA

D)Palm OS

Q6) User data is kept in the ________ section of a PDA.

Page 7

To view all questions and flashcards with answers, click on the resource link above.

Chapter 6: Operating Systems and Data Transmission

Basics for Digital Investigations

Available Study Resources on Quizplus for this Chatper

52 Verified Questions

52 Flashcards

Source URL: https://quizplus.com/quiz/43040

Sample Questions

Q1) The user interface is also known as a(n)________.

Q2) Which of the following is NOT considered a part of file management?

A)Reading data

B)Modification of data

C)Verification of data

D)Accessing data

Q3) An inode is a(n)

A)storage unit common in Windows systems

B)directory in original DOS systems

C)information structure on Macintosh systems

D)storage "clearinghouse" of file information on UNIX systems

Q4) Each layer on a host communicates with the

A)Next highest layer on the other host

B)Same layer on the other host

C)Previous layer on the other host

D)All layers on the other host simultaneously

Q5) In data transfer,only the ________ changes from router or switch to the next one in line.

Q7) The native file system for Windows NT,2000,and XP is ________. Page 8

Q6) The original MS-DOS FAT system is now referred to as ________.

To view all questions and flashcards with answers, click on the resource link above.

Page 9

Chapter 7: Investigating Windows, linux, and Graphic Files

Available Study Resources on Quizplus for this Chatper

57 Verified Questions

57 Flashcards

Source URL: https://quizplus.com/quiz/43041

Sample Questions

Q1) Files are first loaded into a(n)________ before being printed.

Q2) Character devices

A)Unbuffered files used to exchange data

B)Virtual connections between two processes

C)Provide a FIFO mechanism

D)Buffered files used to exchange data

Q3) Named pipes

A)Unbuffered files used to exchange data

B)Virtual connections between two processes

C)Provide a FIFO mechanism

D)Buffered files used to exchange data

Q4) .

A)Used to match the ASCII hexadecimal representation of a single character

B)Implements an OR situation

C)When placed after a character, matches any number of occurrences of that character

D)Matches a single character

Q5) The ________ command gives Linux users the ability to perform administrative duties,which require a separate password for each user.

Page 10

Q6) A(n)________ is designed as a hierarchical listing of folders and files.

To view all questions and flashcards with answers, click on the resource link above.

Chapter 8: E-Mail and Webmail Forensics

Available Study Resources on Quizplus for this Chatper

47 Verified Questions

47 Flashcards

Source URL: https://quizplus.com/quiz/43042

Sample Questions

Q1) ________ is writing the same data in two places.

Q2) The ________ comes before the @ sign in an e-mail address

Q3) What portion of an e-mail records such information as the identity of the creator?

A)The trailer

B)The body

C)The header

D)None of these

Q4) One of the challenges when trying to find webmail evidence is that

A)Webmail is more widely used than client programs

B)Webmail accounts are harder to access

C)Webmail accounts are easier to use

D)E-mails from webmail accounts are not typically stored on the user's computer

Q5) A check of the ________ will determine how long a company keeps e-mails.

Q6) You can look in the ________ folder to find applications such as Eudora or Lotus Notes.

Q7) POP3

A)Dependant upon Internet

B)Accessible from anywhere

C)Special software required

Page 11

To view all questions and flashcards with answers, click on the resource link above.

Chapter 9: Internet and Network Forensics and Intrusion Detection

Available Study Resources on Quizplus for this Chatper

39 Verified Questions

39 Flashcards

Source URL: https://quizplus.com/quiz/43043

Sample Questions

Q1) Software clients called ________ installed on network devices are designed to collect information from the host.

Q2) WAP

A)Repeats any and all data

B)Duplicates data on any port and forwards it to the NFAT

C)Transmits and receives RF

D)Used like a cable splice

Q3) The NFAT software usually contains a query language such as

A)IMS

B)IIS

C)SQL

D)PHP

Q4) The newest NFAT systems are a combination of

A)IDS and application software

B)IDS and forensic software

C)Agents and application software

D)DHCP servers and IDSs

Q5) The ________ is a major source of forensic data in both the stand-alone and network forensic fields.

Q6) ________ transmit and receive data via radio frequency in the open. Page 12

To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 10: Tracking Down Those Who Intend to Do Harm

on a Large Scale

Available Study Resources on Quizplus for this Chatper

39 Verified Questions

39 Flashcards

Source URL: https://quizplus.com/quiz/43044

Sample Questions

Q1) Investigations into hackers can be difficult because even with a full audit trail showing that a user came from a particular account on a particular ISP,

A)ISPs almost never release the necessary information

B)The hacker may use more than one ISP

C)Often only billing information is available,which does not prove identity

D)All of the above

Q2) Which of the following is NOT considered a tactic used by hackers to hijack a computer?

A)DoS attacks

B)Spamming activities

C)Phishing scams

D)Breaking and entering

Q3) From May through June of 2002,the al Qaeda Web site appeared at a Web location in

A)Malaysia

B)Texas

C)Michigan

D)All of the above

Q4) A(n)________ program reads from one port and writes to another.

To view all questions and flashcards with answers, click on the resource link above. Page 14

Chapter 11: Fraud and Forensic Accounting Investigation

Available Study Resources on Quizplus for this Chatper

40 Verified Questions

40 Flashcards

Source URL: https://quizplus.com/quiz/43045

Sample Questions

Q1) Adelphia

A)Admitted to "loaning" $ 2.3 billion to the Rigas family

B)Insiders sell over $ 1.5 billion of inflated stock

C)CEO and CFO charged with multiple counts of fraud

Q2) An essential element of fraud is

A)Intent

B)Lying about facts

C)Concealment

D)Misrepresentation of truth

Q3) Concealment

A)Destroying documents prior to an investigation

B)Showing perp had a chance to commit crime

C)Is a strong circumstantial element

D)Finding multiple events of the same error

Q4) ________ consists of notes,reports about conversations with clients or witnesses,or other confidential materials an attorney creates.

Q5) Section 302 of the ________ Act compels companies to report all occupational fraud regardless of the amount of the loss.

Q6) _____ fraud may be committed by a vendor or supplier.

Page 15

To view all questions and flashcards with answers, click on the resource link above.

Chapter 12: Federal Rules and Criminal Codes

Available Study Resources on Quizplus for this Chatper

49 Verified Questions

49 Flashcards

Source URL: https://quizplus.com/quiz/43046

Sample Questions

Q1) Rule 104(a)

A)Even if relevant, evidence may be excluded if it misleads the jury

B)Preliminary questions concerning qualifications of an expert witness

C)Evidence is admissible unless ruled on by an Act of Congress

D. A qualified expert may testify if based upon sufficient facts

Q2) Authentication

A)Qualified experts may testify though not eyewitnesses

B)The evidence is valuable to an issue of the case

C)Keeps private attorney-client communications

D)The evidence is what it claims to be

E)Ruling against "out of court" statements

Q3) Which of the following was the first law to address computer crime in which the computer is the subject of the crime?

A)Electronic Communications Privacy Act

B)USA PATRIOT Act

C)Computer Fraud and Abuse Act

D)Pen/Trap Statute

Q4) Real-time interception of computer information in transit falls under the ________ Statute.

Q5) The Frye test that Rule 702 relied upon was replaced with the ________ test.

Page 16

To view all questions and flashcards with answers, click on the resource link above.

Chapter 13: Ethical and Professional Responsibility in Testimony

Available Study Resources on Quizplus for this Chatper

30 Verified Questions

30 Flashcards

Source URL: https://quizplus.com/quiz/43047

Sample Questions

Q1) A(n)________ contains a complete statement of all opinions to be expressed and the basis and reasons for those opinions.

Q2) Opposing counsel will do their best to ________ or discredit your testimony.

Q3) Everyone involved in the courts has a(n)________ to protect the legal system and the Constitution.

Q4) As an expert witness,what should you NOT do while in court?

A)Be patient.

B)Try to be relaxed and look at the jury when answering.

C)Be truthful,careful,and precise.

D)Dress casually and comfortably.

Q5) A common trap used by lawyers is to ask you to offer opinions outside ________.

Q6) The _______ was designed to encourage witnesses to testify freely and honestly without fear of lawsuits arising from their testimony.

Q7) An expert witness is the only witness who

A)Can be deposed out of court

B)Can give an opinion about what happened without having been there

C)Always testifies for the defense

D)Always testifies for the prosecution

Q8) A witness who will testify in a trial is called a(n)________ witness. Page 17

To view all questions and flashcards with answers, click on the resource link above.

Page 18

Turn static files into dynamic content formats.

Create a flipbook