Question details

SEC 340 Computer Forensics Strayer Week 11 Final Examination 2016
$ 30.00

Question 1

A ____ table is a table of password hashes created by hashing every possible password and variation thereof to be used in a rainbow attack to recover a plaintext password from a captured ciphertext.

   

dictionary

   

syllable

   

crack

   

rainbow

Question 2

____ is the practice of embedding hidden messages within a carrier medium.

   

Encryption

   

Steganography

   

Hashing

   

Cryptography

Question 3

____ creates a change in the cover object in order to hide the information. An encoder performs a sequence of modifications to the cover that corresponds to a secret message.

   

Perceptual masking

   

A transform-domain

   

Injection

   

Distortion

Question 4

The Linux ____ command can make a bit-stream disk-to-disk copy or a disk-to-image file.

   

diskcopy

   

xcopy

   

shwdwcpy

   

dd

Question 5

EnCase calculates a(n) ____ hash when it acquires a physical drive or logical drive.

   

SHA-1

   

CRC

   

SHA-512

   

MD5

Question 6

A ____ is a fixed-size integer resulting from the application of a CRC algorithm.

   

signature

   

checksum

   

fingerprint

   

footprint

Question 7

In Windows, each hard disk has a hidden folder named ____. This folder contains the files deleted from Windows Explorer or My Computer.

   

Restore

   

Recycled

   

Recovery

   

Deleted

Question 8

Recycled files on the NTFS system are categorized into directories named as C:\RECYCLER\S-...., based on the user’s Windows ____.

   

PID

   

GID

   

SID

   

UID

____ forensics is the capturing, recording, and analysis of network events in order to discover the source of security attacks.

   

Computer

   

Network

   

Remote

   

User

Question 10

____ is the process of tracking unauthorized activity using techniques such as inspecting user actions, security logs, or audit data.

   

Logging

   

Enumeration

   

Intrusion detection

   

Sweeping

Question 11

A(n) ____ is a piece of hardware used to provide an interface between a host machine and a computer network.

   

socket

   

port

   

NIC

   

MAC

Question 12

____ is the method of wrapping data from one layer of the OSI model in a new data structure so that each layer of the OSI model will only see and deal with the information it needs in order to properly handle and deliver the data from one host to another on a computer network.

   

Layering

   

Internetworking

   

Interconnection

   

Encapsulation

____ is an application-layer hacking method used for hacking Web applications.

   

Cookie snooping

   

Cross-site scripting (XSS)

   

Directory traversal

   

URL interpretation

Question 14

In a(n) ____ attack, when a user sends any application to the server, an attacker hacks the application and adds malicious code.

   

SQL injection

   

URL interpretation

   

parameter tampering

   

code injection

Question 15

In ____ attacks, attackers attempt to prevent legitimate users of a service from using it by flooding the network with traffic or disrupting connections.

   

network

   

DoS

   

firewall

   

ping

Question 16

A(n) ____ is defined as the average packet rate of data packets with similar packet header information.

   

baseline

   

activity profile

   

netflow

   

network entropy

Question 17

____ is the entity that oversees global IP address allocation, DNS root zone management, media types, and other Internet protocol assignments.

   

ARIN

   

APNIC

   

LACNIC

   

IANA

Question 18

____ is all about collecting information such as client lists to perpetrate frauds and scams in order to affect a rival financially.

   

Phishing

   

Corporate espionage

   

Cyber terrorism

   

Spamming

Question 19

When computers start communicating without human intervention they can create a flurry of junk mail, often sent by accident, called a ____.

   

spam

   

chain e-mail

   

mail bomb

   

mail storm

Question 20

An SMTP server listens on port ____ and handles all outgoing e-mail.

   

10

   

21

   

25

   

125

Question 21

According to the USPTO, a ____ is a form of protection provided to the authors of “original works of authorship” including literary, dramatic, musical, artistic, and certain other intellectual works, both published and unpublished.

   

trademark

   

service mark

   

collective mark

   

copyright

Question 22

A ____ is a property right granted to the inventor by the USPTO to keep others from making, using, or selling the invention without authorization.

   

copyright

   

patent

   

trademark

   

service mark

Question 23

A(n) ____ is a suitor who desires a physical or intimate relationship with the victim.

   

rejected stalker

   

intimacy seeker

   

incompetent suitor

   

cyberstalker

Question 24

____ is a repeated, unwelcomed activity that involves gazing at, following, or harassing another person.

   

Stalking

   

Bullying

   

Hostile work environment

   

Quid pro quo

Question 25

____ is one of the features of most Internet browsers. It shows what files were downloaded and where the downloaded files were saved.

   

Browser cache

   

Download history

   

Cookies

   

Browser history

Question 26

The ____ is a collection of Web page copies stored on the system’s hard disk or in its volatile memory.

   

download history

   

browser history

   

browser cookies

   

browser cache

 

 

 

Question 27

The goal of a(n) ____ attack is to degrade the performance of the network by directing unnecessary packets of data toward it.

   

flooding

   

eavesdropping

   

fragmentation

   

Manipulation

Question 28

The ____ tool attempts to confuse the connected wireless devices by sending deauthentication packets.

   

Kismet

   

Airodump

   

Aireplay

   

Tcpdump

Question 29

iPods formatted with Mac computers use Apple’s ____ file system, while those formatted on Windows use the FAT32 file system.

   

ext2

   

ext3

   

HFS+

   

NFS+

Question 30

The iPhone OS ____ layer provides the fundamental services for applications such as Address Book, Core Location, CFNetwork, Security, and SQLite.

   

core OS

   

Cocoa Touch

   

core services

   

media

 

Available solutions