100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Midterm Study 537 Computer Skills Questions And Answers

Rating
-
Sold
-
Pages
29
Grade
A+
Uploaded on
14-10-2023
Written in
2023/2024

Midterm Study 537 Computer Skills Questions And Answers Which of the following is NOT an example of Packet Analysis Tools? Question 2 options: ngrep PSML Hex Editors Wireshark - ANS-PSML pg. 96 4.2.1 Footprint - ANS-the impact investigators has on the systems under investigation A list of strings, names, patterns, etc., that may be related to the suspicious activities within a network traffic under investigation is referred to as __________ Question 3 options: "packet protocol list" "flow record list" "string pattern list" "dirty word list" - ANS-"dirty word list" pg 100 4.2.2.1 Which of the following is NOT a fundamental technique used to analyze a packet? Question 4 options: Parsing Protocol Fields Packet Filtering Pattern Matching Packet Detail Markup - ANS-Packet Detail Markup pg 99 4.2.2 How to minimize your footprint? - ANS-You will always have one. Must be weighed against the need for expediency in data collection, always be conscious, and tread lightly DNS is a higher-layer query-response protocol - ANS-True pg 128 Which of the following is a means of identifying protocol? (Choose all that apply) Question 6 options: Leverage information in the encapsulating protocol Leverage the TCP/UDP port number, many of which are associated with standard default services Test for the presence of recognizable protocol structures Extract the contents of protocol fields. Search for common binary/hexadecimal/ASCII values that are typically associated with a specific protocol - ANS-- Search for common binary/hexadecimal/ASCII values that are typically associated with a specific protocol - Leverage the TCP/UDP port number, many of which are associated with standard default services - Test for the presence of recognizable protocol structures - Leverage information in the encapsulating protocol Header containing source port, destination port, sequence number, ack number - ANSTCP header Headers containing version, header length, total length, identification, fragment offset, ttl, protocol, header checksum, source address, destination address - ANS-IP header Network based digital evidence - ANS-digital evidence produced as a result of communication over a network Examining the contents and/or metadata of one or more protocols within a set of packets is referred to as ______. Question 7 options: Packet matching Flow Analysis Packet Analysis Protocol Analysis - ANS-Packet Analysis pg 95 4.2 The technique of interpreting the data in a frame according to a specific known structure, in order to correctly understand the meaning of each bit in the communication is known as ________. Question 8 options: Packet Analysis Protocol Analysis Protocol Decoding Packet Decoding - ANS-Protocol Decoding pg 90 4.1.3.2 OSCAR - ANS-network forensics investigative methodology includes obtain info, strategize, collect evidence, analyze, and report Which of the following is a technique in decoding network traffic according to a specific protocol specification? Question 9 options: Search for common binary/hexadecimal/ASCII values of the traffic protocol Refer to publicly available documentation and manually decode the traffic Leverage the TCP/UDP port number, Leverage information in the encapsulating protocol - ANS-Refer to publicly available documentation and manually decode the traffic pg 91 4.1 A flow is always mapped one-on-one to a transport connection. true false - ANS-False 4.3 pg 105 Cryptographic hash - ANS-A unique footprint to a piece of data. Used for the integrity of the data also known as checksum. If 2 have the same hash=broken Every network card on an Ethernet network has a ____________MAC address, assigned by the manufacturer. Question 12 options: 2-byte 64-byte 6-byte 32-byte - ANS-6-byte 4.4.1.2 pg 122 Examples of cryptographic hashes - ANS-SHAW1 (secure hashing algorithm 1) MD5 Capture network packets between computers and decode the packets so that one can view what is occurring during transmission - ANS-protocol analysis Which of the following is a technique used in conducting packet analysis? (Choose all that apply) Question 13 options: Separate packets based on the values of fields in protocol metadata. Extract the contents of protocol fields. Test for the presence of recognizable protocol structures Leverage information in the encapsulating protocol Identify packets of interest by matching specific values within the packet capture. - ANS- - Separate packets based on the values of fields in protocol metadata. - Identify packets of interest by matching specific values within the packet capture. - Extract the contents of protocol fields. 4.2.2 pg 99 Special devices designed to perform deeper inspection of network traffic in order to make more intelligent decisions as to what traffic should be forwarded and what traffic should be logged or dropped are called ___________

Show more Read less
Institution
Mid-Stud 537 Computer Skills
Course
Mid-Stud 537 Computer Skills










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Mid-Stud 537 Computer Skills
Course
Mid-Stud 537 Computer Skills

Document information

Uploaded on
October 14, 2023
Number of pages
29
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Accurate Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
466
Member since
3 year
Number of followers
267
Documents
10583
Last sold
1 week ago
Accurate Solutions

Discover high-quality study materials crafted for students across various subjects, including Nursing, Mathematics, Psychology, and Biology. Our resources feature comprehensive guides, updated exam solutions, and reliable notes designed to enhance your learning experience. Achieve your academic goals with materials that inspire confidence. #Don't Forget To Leave A Great Review!

4.1

68 reviews

5
38
4
13
3
8
2
2
1
7

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions