____ hide the most valuable data at the CDMA
innermost part of the network. OFDM
Protocols 3G - ANSWER -"
Firewalls "3G
NAT
Layered network defense strategies -
ANSWER -"Layered network defense In Microsoft Outlook, you can save sent, drafted,
strategies deleted, and received e-mails in a file with a file
extension of ____.
.msg
Many password-protected OSs and applications .eml
store passwords in the form of ____ or SHA hash .pst
values. .ost - ANSWER -"
AES ".pst
SSH
SSL
MD5 - ANSWER -" In a(n) ____ attack, the attacker keeps asking
"MD5 your server to establish a connection.
brute-force attack
ACK flood
To retrieve e-mail headers in Microsoft Outlook, PCAP attack
double-click the e-mail message, and then click SYN flood - ANSWER -"
File, ____. The ""Internet headers"" text box at "SYN flood
the bottom of the dialog box contains the
message header.
Options Typically, UNIX installations are set to store logs
Properties in the ____ directory.
Message Source /log
Details - ANSWER -" /etc/var/log
"Properties /etc/Log
/var/log - ANSWER -"
"/var/log
____ are devices or software placed on a
network to monitor traffic.
Packet analyzers WinHex provides several hashing algorithms,
Bridges such as MD5 and ____.
Hubs CRC
Honeypots - ANSWER -" SHA-1
"Packet analyzers AES
RC4 - ANSWER -"
" SHA-1
By the end of 2008, mobile phones had gone
through three generations: analog, digital
personal communications service (PCS), and ____ can be programmed to examine TCP
____. headers to fin the SYN flag.
D-AMPS Memorizer
1/9
, Digital Forensics Quiz 9-12 Test with Answers Graded A+
memfetch Pcap
tethereal DOPI
john - ANSWER -" AIATP
"tethereal SYN - ANSWER -"
"Pcap
A lesser known tool used widely by government
agencies is ____, which retrieves data from People who want to hide data can also use
smartphones, GPS devices, tablets, music advanced encryption programs, such as PGP or
players, and drones. ____.
MOBILedit Forensic FTK
Micro Systemation XRY PRTK
DataPilor BestCrypt
BitPim - ANSWER -" NTI - ANSWER -"
"Micro Systemation XRY "BestCrypt
Some e-mail systems store messages in flat Mobile devices can range from simple phones to
plaintext files, known as a(n) ____ format. ____.
SMTP smartphones
POP3 flip phones
mbox PDAs
MIME - ANSWER -" feature phones - ANSWER -"
"mbox "smartphones
The files that provide helpful information to an e- The software that runs virtual machines is called
mail investigation are log files and ____ files. a ____.
.rts computer
scripts server
batch hypervisor
configuration - ANSWER -" host - ANSWER -"
"configuration "hypervisor
____ alters hash values, which makes cracking You begin a digital forensics case by creating
passwords more difficult. a(n) ____.
Hybrid attack risk assessment report
Rainbow table investigation report
Salting passwords investigation plan
PRTK - ANSWER -" evidence custody form - ANSWER -"
"Salting passwords "investigation plan
Most packet analyzer tools can read anything ____ allocates space for a log file on the server,
captured in ____ format. and then starts overwriting from the beginning
2/9