

![]()


Network Security is a foundational course that explores the principles, methodologies, and technologies used to protect computer networks from unauthorized access, misuse, and attacks. Students learn about core security concepts such as cryptography, authentication, firewalls, intrusion detection and prevention systems, virtual private networks (VPNs), and network protocols. The course also covers risk assessment, security policies, and incident response strategies. Through practical exercises and case studies, students develop the skills necessary to identify vulnerabilities, implement countermeasures, and maintain secure network infrastructures in both enterprise and cloud environments.
Recommended Textbook
Computer Forensics Principles and Practices 1st Edition by Linda Volonino
Available Study Resources on Quizplus
13 Chapters
600 Verified Questions
600 Flashcards
Source URL: https://quizplus.com/study-set/2159 Page 2

Available Study Resources on Quizplus for this Chatper
33 Verified Questions
33 Flashcards
Source URL: https://quizplus.com/quiz/43035
Sample Questions
Q1) What federal program provides computer forensic expertise to law enforcement agencies?
A)The RCFL
B)The NBCD
C)The ACHF
D)The CDCF
Answer: A
Q2) A(n)________ is considered an offensive act against societal laws.
Answer: crime
Q3) Which of the following has the most far-reaching effect for law enforcement concerning cybercrimes?
A)FERPA
B)CFAA
C)CAN-SPAM Act
D)USA PATRIOT Act
Answer: D
Q4) A(n)________ is a lesser crime such as careless driving.
Answer: misdemeanor
Q5) For any item of evidence to be considered admissible,it must first be ________. Answer: authenticated
To view all questions and flashcards with answers, click on the resource link above. Page 3
Available Study Resources on Quizplus for this Chatper
28 Verified Questions
28 Flashcards
Source URL: https://quizplus.com/quiz/43036
Sample Questions
Q1) The ________ states that evidence collected in violation of the Fourth Amendment cannot be used in a trial.
Answer: exclusionary rule
Q2) In order to be legally defensible,methods used in the recovery of data must ensure that
A)The original evidence was not altered.
B)No data was added to the original.
C)No data was deleted from the original.
D)All of the above
Answer: D
Q3) ________ is the blending of accounting,auditing,and investigative skills.
Answer: Forensic accounting
Q4) Hackers go after valuable content such as
A)Expensive applications
B)Links to terrorist Web sites
C)Pricing data
D)Malware scripts
Answer: C
Q5) A(n)________ is a reasonable belief that a person has committed a crime.
Answer: probable cause

4
To view all questions and flashcards with answers, click on the resource link above.
Available Study Resources on Quizplus for this Chatper
48 Verified Questions
48 Flashcards
Source URL: https://quizplus.com/quiz/43037
Sample Questions
Q1) A computer forensic specialist may examine the ________ to ascertain the true identity of a file.
Answer: file header
Q2) MacQuisition Boot CD
A) Investigates the contents of BlackBerry devices
B) Graphical user interface consists of a series of panes
C) Safely and easily images Mac drives
D) Reads the first 32 bits of a file to identify its type
E) Open-source program that runs on UNIX plattorms
Answer: C
Q3) dtSearch
A) The universal hexadecimal editor
B) Invaluable for combing through large amounts of data
C) Exclusively for Macs
D) AccessData tool designed for finding and examining evidence
E) Primarily for computer crime investigators
Answer: B

Page 5
To view all questions and flashcards with answers, click on the resource link above.

Available Study Resources on Quizplus for this Chatper
63 Verified Questions
63 Flashcards
Source URL: https://quizplus.com/quiz/43038
Sample Questions
Q1) You can use ________ analysis to eliminate common files by comparing them to the same files on your system.
Q2) External USB drive
A)Useful for transferring large amounts of data or images
B)Necessary if there are no convenient plugs
C)Startup disks, CDs, or USB drives
D)Used to keep notes or upload photographs
E)Screwdrivers, pliers, duct tape
Q3) Include a(n)________ as part of your forensic equipment because it allows you to carry a library of forensic tools and can give you access to the Internet.
Q4) Estimation of time
A)How long will an on-site examination last?
B)Will the investigation cause financial hardships?
C)How volatile is the evidence?
D)Is the equipment impractical?
E)Is this to be done on-site or in the lab?
Q5) With the original evidence safely stored,you should make a(n)________ of the forensic image.
Q6) The main reason for file compression is to ________.
Page 6
To view all questions and flashcards with answers, click on the resource link above.

Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/43039
Sample Questions
Q1) Most recent ZIP drives can handle up to what amount of data?
A)500GB
B)1GB
C)750MB
D)120MB
Q2) Paraben software
A)Considered to be the gold standard
B)Highly regarded and able to generate detailed reports
C)Considered most reliable for hardware
D)Has Faraday bags
Q3) One excellent feature of ________ is that this software can crack Palm passwords.
Q4) The simple rule for powering down equipment is that you pull the plug on everything but ________.
Q5) GSMXRY
A)CDMA phones
B)GSM phones
C)Supports GSM and TDMA
D)Palm OS
Q6) User data is kept in the ________ section of a PDA.
Page 7
To view all questions and flashcards with answers, click on the resource link above.

Available Study Resources on Quizplus for this Chatper
52 Verified Questions
52 Flashcards
Source URL: https://quizplus.com/quiz/43040
Sample Questions
Q1) The user interface is also known as a(n)________.
Q2) Which of the following is NOT considered a part of file management?
A)Reading data
B)Modification of data
C)Verification of data
D)Accessing data
Q3) An inode is a(n)
A)storage unit common in Windows systems
B)directory in original DOS systems
C)information structure on Macintosh systems
D)storage "clearinghouse" of file information on UNIX systems
Q4) Each layer on a host communicates with the
A)Next highest layer on the other host
B)Same layer on the other host
C)Previous layer on the other host
D)All layers on the other host simultaneously
Q5) In data transfer,only the ________ changes from router or switch to the next one in line.
Q7) The native file system for Windows NT,2000,and XP is ________. Page 8
Q6) The original MS-DOS FAT system is now referred to as ________.
To view all questions and flashcards with answers, click on the resource link above.
Page 9

Available Study Resources on Quizplus for this Chatper
57 Verified Questions
57 Flashcards
Source URL: https://quizplus.com/quiz/43041
Sample Questions
Q1) Files are first loaded into a(n)________ before being printed.
Q2) Character devices
A)Unbuffered files used to exchange data
B)Virtual connections between two processes
C)Provide a FIFO mechanism
D)Buffered files used to exchange data
Q3) Named pipes
A)Unbuffered files used to exchange data
B)Virtual connections between two processes
C)Provide a FIFO mechanism
D)Buffered files used to exchange data
Q4) .
A)Used to match the ASCII hexadecimal representation of a single character
B)Implements an OR situation
C)When placed after a character, matches any number of occurrences of that character
D)Matches a single character
Q5) The ________ command gives Linux users the ability to perform administrative duties,which require a separate password for each user.
Page 10
Q6) A(n)________ is designed as a hierarchical listing of folders and files.
To view all questions and flashcards with answers, click on the resource link above.
Available Study Resources on Quizplus for this Chatper
47 Verified Questions
47 Flashcards
Source URL: https://quizplus.com/quiz/43042
Sample Questions
Q1) ________ is writing the same data in two places.
Q2) The ________ comes before the @ sign in an e-mail address
Q3) What portion of an e-mail records such information as the identity of the creator?
A)The trailer
B)The body
C)The header
D)None of these
Q4) One of the challenges when trying to find webmail evidence is that
A)Webmail is more widely used than client programs
B)Webmail accounts are harder to access
C)Webmail accounts are easier to use
D)E-mails from webmail accounts are not typically stored on the user's computer
Q5) A check of the ________ will determine how long a company keeps e-mails.
Q6) You can look in the ________ folder to find applications such as Eudora or Lotus Notes.
Q7) POP3
A)Dependant upon Internet
B)Accessible from anywhere
C)Special software required

Page 11
To view all questions and flashcards with answers, click on the resource link above.

Available Study Resources on Quizplus for this Chatper
39 Verified Questions
39 Flashcards
Source URL: https://quizplus.com/quiz/43043
Sample Questions
Q1) Software clients called ________ installed on network devices are designed to collect information from the host.
Q2) WAP
A)Repeats any and all data
B)Duplicates data on any port and forwards it to the NFAT
C)Transmits and receives RF
D)Used like a cable splice
Q3) The NFAT software usually contains a query language such as
A)IMS
B)IIS
C)SQL
D)PHP
Q4) The newest NFAT systems are a combination of
A)IDS and application software
B)IDS and forensic software
C)Agents and application software
D)DHCP servers and IDSs
Q5) The ________ is a major source of forensic data in both the stand-alone and network forensic fields.
Q6) ________ transmit and receive data via radio frequency in the open. Page 12
To view all questions and flashcards with answers, click on the resource link above. Page 13

Available Study Resources on Quizplus for this Chatper
39 Verified Questions
39 Flashcards
Source URL: https://quizplus.com/quiz/43044
Sample Questions
Q1) Investigations into hackers can be difficult because even with a full audit trail showing that a user came from a particular account on a particular ISP,
A)ISPs almost never release the necessary information
B)The hacker may use more than one ISP
C)Often only billing information is available,which does not prove identity
D)All of the above
Q2) Which of the following is NOT considered a tactic used by hackers to hijack a computer?
A)DoS attacks
B)Spamming activities
C)Phishing scams
D)Breaking and entering
Q3) From May through June of 2002,the al Qaeda Web site appeared at a Web location in
A)Malaysia
B)Texas
C)Michigan
D)All of the above
Q4) A(n)________ program reads from one port and writes to another.
To view all questions and flashcards with answers, click on the resource link above. Page 14

Available Study Resources on Quizplus for this Chatper
40 Verified Questions
40 Flashcards
Source URL: https://quizplus.com/quiz/43045
Sample Questions
Q1) Adelphia
A)Admitted to "loaning" $ 2.3 billion to the Rigas family
B)Insiders sell over $ 1.5 billion of inflated stock
C)CEO and CFO charged with multiple counts of fraud
Q2) An essential element of fraud is
A)Intent
B)Lying about facts
C)Concealment
D)Misrepresentation of truth
Q3) Concealment
A)Destroying documents prior to an investigation
B)Showing perp had a chance to commit crime
C)Is a strong circumstantial element
D)Finding multiple events of the same error
Q4) ________ consists of notes,reports about conversations with clients or witnesses,or other confidential materials an attorney creates.
Q5) Section 302 of the ________ Act compels companies to report all occupational fraud regardless of the amount of the loss.
Q6) _____ fraud may be committed by a vendor or supplier.
Page 15
To view all questions and flashcards with answers, click on the resource link above.

Available Study Resources on Quizplus for this Chatper
49 Verified Questions
49 Flashcards
Source URL: https://quizplus.com/quiz/43046
Sample Questions
Q1) Rule 104(a)
A)Even if relevant, evidence may be excluded if it misleads the jury
B)Preliminary questions concerning qualifications of an expert witness
C)Evidence is admissible unless ruled on by an Act of Congress
D. A qualified expert may testify if based upon sufficient facts
Q2) Authentication
A)Qualified experts may testify though not eyewitnesses
B)The evidence is valuable to an issue of the case
C)Keeps private attorney-client communications
D)The evidence is what it claims to be
E)Ruling against "out of court" statements
Q3) Which of the following was the first law to address computer crime in which the computer is the subject of the crime?
A)Electronic Communications Privacy Act
B)USA PATRIOT Act
C)Computer Fraud and Abuse Act
D)Pen/Trap Statute
Q4) Real-time interception of computer information in transit falls under the ________ Statute.
Q5) The Frye test that Rule 702 relied upon was replaced with the ________ test.
Page 16
To view all questions and flashcards with answers, click on the resource link above.

Available Study Resources on Quizplus for this Chatper
30 Verified Questions
30 Flashcards
Source URL: https://quizplus.com/quiz/43047
Sample Questions
Q1) A(n)________ contains a complete statement of all opinions to be expressed and the basis and reasons for those opinions.
Q2) Opposing counsel will do their best to ________ or discredit your testimony.
Q3) Everyone involved in the courts has a(n)________ to protect the legal system and the Constitution.
Q4) As an expert witness,what should you NOT do while in court?
A)Be patient.
B)Try to be relaxed and look at the jury when answering.
C)Be truthful,careful,and precise.
D)Dress casually and comfortably.
Q5) A common trap used by lawyers is to ask you to offer opinions outside ________.
Q6) The _______ was designed to encourage witnesses to testify freely and honestly without fear of lawsuits arising from their testimony.
Q7) An expert witness is the only witness who
A)Can be deposed out of court
B)Can give an opinion about what happened without having been there
C)Always testifies for the defense
D)Always testifies for the prosecution
Q8) A witness who will testify in a trial is called a(n)________ witness. Page 17
To view all questions and flashcards with answers, click on the resource link above.
Page 18