Computer Networking Fundamentals
8 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the process of gathering and documenting evidence in a secure manner called during a cybercrime investigation?

  • Data extraction
  • Chain of custody (correct)
  • Forensic analysis
  • Evidence accumulation

Which step of the digital forensic process involves making an exact copy of digital evidence without altering it?

  • Forensic acquisition (correct)
  • Data extraction
  • Forensic analysis
  • Chain of custody

Why is it important for ethical hackers to work according to a rules of engagement document?

  • To establish payment terms for the hacker
  • To provide guidelines for social engineering attacks
  • To ensure legality and define the scope of testing (correct)
  • To outline the technical specifications of the servers

What is the sequence of the TCP connection establishment process also known as the 3-way handshake?

<p>SYN SYN/ACK ACK (B)</p> Signup and view all the answers

At which layer of the OSI model does a router operate?

<p>Network layer (B)</p> Signup and view all the answers

What is the primary function of a router?

<p>Routing packets between networks (B)</p> Signup and view all the answers

Which of the following is not a type of digital evidence?

<p>Human testimony (D)</p> Signup and view all the answers

What is the significance of the 3-way handshake in TCP connection establishment?

<p>Establishes a connection between devices (A)</p> Signup and view all the answers

More Like This

OSI Model Layers 3 and 4
40 questions
Netzwerktechnologien und Protokolle
10 questions
Networking Protocols Quiz
24 questions
Use Quizgecko on...
Browser
Browser