
Network Forensics Overview
Authored by Brian Guillotte
9th - 12th Grade
Used 10+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
5 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
The three modes of protection in the DiD strategy are people, technology, and operations
True
False
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
A layered network defense strategy puts the most valuable data where?
In the DMZ
In the outermost layer
In the innermost layer
None of the above
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Tcpslice can be used to retrieve specific timeframes of packet captures.
True
False
4.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Packet analyzers examine what layers of the OSI model?
Layers 2 and 4
Layers 4 through 7
Layers 2 and 3
All layers
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
When do zero day attacks occur?
On the day the application or OS is released
Before the vendor is aware of the vulnerability
On the day a patch is created
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?