100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

Digital Forensics Quiz 9-12 Test with Answers Graded A+

Rating
-
Sold
-
Pages
9
Grade
A+
Uploaded on
11-12-2025
Written in
2025/2026

____ hide the most valuable data at the innermost part of the network. Protocols Firewalls NAT Layered network defense strategies - ANSWER -"Layered network defense strategies Many password-protected OSs and applications store pass

Show more Read less
Institution
Digital Forensics
Course
Digital Forensics









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Digital Forensics
Course
Digital Forensics

Document information

Uploaded on
December 11, 2025
Number of pages
9
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Digital Forensics Quiz 9-12 Test with Answers Graded A+
____ hide the most valuable data at the CDMA
innermost part of the network. OFDM
Protocols 3G - ANSWER -"
Firewalls "3G
NAT
Layered network defense strategies -
ANSWER -"Layered network defense In Microsoft Outlook, you can save sent, drafted,
strategies deleted, and received e-mails in a file with a file
extension of ____.
.msg
Many password-protected OSs and applications .eml
store passwords in the form of ____ or SHA hash .pst
values. .ost - ANSWER -"
AES ".pst
SSH
SSL
MD5 - ANSWER -" In a(n) ____ attack, the attacker keeps asking
"MD5 your server to establish a connection.
brute-force attack
ACK flood
To retrieve e-mail headers in Microsoft Outlook, PCAP attack
double-click the e-mail message, and then click SYN flood - ANSWER -"
File, ____. The ""Internet headers"" text box at "SYN flood
the bottom of the dialog box contains the
message header.
Options Typically, UNIX installations are set to store logs
Properties in the ____ directory.
Message Source /log
Details - ANSWER -" /etc/var/log
"Properties /etc/Log
/var/log - ANSWER -"
"/var/log
____ are devices or software placed on a
network to monitor traffic.
Packet analyzers WinHex provides several hashing algorithms,
Bridges such as MD5 and ____.
Hubs CRC
Honeypots - ANSWER -" SHA-1
"Packet analyzers AES
RC4 - ANSWER -"
" SHA-1
By the end of 2008, mobile phones had gone
through three generations: analog, digital
personal communications service (PCS), and ____ can be programmed to examine TCP
____. headers to fin the SYN flag.
D-AMPS Memorizer
1/9

, Digital Forensics Quiz 9-12 Test with Answers Graded A+
memfetch Pcap
tethereal DOPI
john - ANSWER -" AIATP
"tethereal SYN - ANSWER -"
"Pcap

A lesser known tool used widely by government
agencies is ____, which retrieves data from People who want to hide data can also use
smartphones, GPS devices, tablets, music advanced encryption programs, such as PGP or
players, and drones. ____.
MOBILedit Forensic FTK
Micro Systemation XRY PRTK
DataPilor BestCrypt
BitPim - ANSWER -" NTI - ANSWER -"
"Micro Systemation XRY "BestCrypt


Some e-mail systems store messages in flat Mobile devices can range from simple phones to
plaintext files, known as a(n) ____ format. ____.
SMTP smartphones
POP3 flip phones
mbox PDAs
MIME - ANSWER -" feature phones - ANSWER -"
"mbox "smartphones


The files that provide helpful information to an e- The software that runs virtual machines is called
mail investigation are log files and ____ files. a ____.
.rts computer
scripts server
batch hypervisor
configuration - ANSWER -" host - ANSWER -"
"configuration "hypervisor


____ alters hash values, which makes cracking You begin a digital forensics case by creating
passwords more difficult. a(n) ____.
Hybrid attack risk assessment report
Rainbow table investigation report
Salting passwords investigation plan
PRTK - ANSWER -" evidence custody form - ANSWER -"
"Salting passwords "investigation plan


Most packet analyzer tools can read anything ____ allocates space for a log file on the server,
captured in ____ format. and then starts overwriting from the beginning
2/9

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
MERCYTRISHIA Howard Community College
View profile
Follow You need to be logged in order to follow users or courses
Sold
180
Member since
1 year
Number of followers
35
Documents
10792
Last sold
6 hours ago
MercyTrishia

On this page, you find all documents, package deals offered by seller MercyTrishia

3.8

37 reviews

5
16
4
7
3
10
2
0
1
4

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions