[go: up one dir, main page]

0% found this document useful (0 votes)
33 views2 pages

BBA Computer Forensics Quiz 4

Uploaded by

MynorGarzona
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views2 pages

BBA Computer Forensics Quiz 4

Uploaded by

MynorGarzona
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 2

Question 1

Which type of equipment joins networks together?

Response: Router

Score: 1 out of 1 Yes

Question 2
Multiple protocols with low number of packets may indicate which activity?

Response: Packet Sniffing

Score: 1 out of 1 Yes

Question 3
Through examining the ________, we hope to discover any backdoors the attacker may
have established.

Response: Open ports

Score: 1 out of 1 Yes

Question 4
What type of data gives you a general pattern of network traffic?

Response: Statistical data

Score: 1 out of 1 Yes

Question 5
Which type of device is used to filter network traffic?

Response: Firewall

Score: 1 out of 1 Yes

Question 6
An open rogue port usually denotes:

Response: A backdoor running on the victim machine

Score: 1 out of 1 Yes

Question 7
In the address 102.50.21.3:1827, what is 1827?

Response: The user ID

Score: The port number.

Question 8
In a standard intrusion scenario, when an intruder conducts probes against a
target system, it is called?

Response: Exploitation

Score: reconnaissance

Question 9
_________ is used to resolve IP addresses to MAC addresses

Response: Address Resolution Table

Score: 1 out of 1 Yes

Question 10
Which event is likely precursor to an attack?

Response: A port scan

Score: 1 out of 1

You might also like