FEDVTE CYBER FUNDAMENTALS FOR LAW ENFORCEMENT INVESTIGATIONS QUESTIONS WITH CORRECT ANSWERS
What are passive footprints? CORRECT ANSWER Data unintentionally left behind during typical internet activities If an investigator in New York state wants to document 2:15 PM on May 31, 2017, how would that moment in time be notated according the ISO 8601 directive? (New York is in the Eastern Time Zone which is -5 UTC, and observes daylight savings) CORRECT ANSWER T18:15:00Z What is considered a common best practice for an analysis environment in terms of Internet connectivity? CORRECT ANSWER Only be connected to the internet when it is absolutely necessary Which of the following is the order of email packet encapsulation? CORRECT ANSWER A. IP Header, Ethernet Header, TCP Header, Email MessageB. Email Message, Ethernet Header, IP Header, TCP HeaderC. Email Message, TCP Header, IP Header, Ethernet HeaderD. Ethernet Header, Email Header, TCP Header, IP Header; Not A Which of the following best describes a domain name? CORRECT ANSWER An identifier used for network and application addressing purposes What website can be used to look up detailed archive data about a domain name? CORRECT ANSWER Information that a web browser reveals about a system or user during typical internet browsing activities is known as: CORRECT ANSWER Browser leak An investigator will get better results if s/he uses their own Facebook account to 'friend' the individual they're investigating. CORRECT ANSWER False When a data packet is being created and prepared for transport, whether the target computer?s IP address is on the same network or on a remote network, is not a consideration. CORRECT ANSWER False
Written for
- Institution
- FEDVTE CYBER FUNDAMENTALS FOR LAW ENFORCEMENT
- Course
- FEDVTE CYBER FUNDAMENTALS FOR LAW ENFORCEMENT
Document information
- Uploaded on
- December 31, 2022
- Number of pages
- 4
- Written in
- 2022/2023
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Also available in package deal