
Network Forensics
Authored by Jerry Jackson Bent
Computers
11th Grade
Used 35+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the first step in network forensics
Ask for permission
Agree on a network-testing methodology
Assemble a team
Gather evidence
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What is the forensic supervisory and investigatory authority responsible for?
Building networks
Hiring IT professionals
Carrying out IT activities
Authorizing the activities of the investigators
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What network-testing tool can be used to inspect all data packets transferring over the network
Pen Drive
Packet Sniffers
Internet Sniffers
Scanner
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What does agreeing on the network testing methodology mean?
Agreeing what the investigators can and cannot do
Agreeing on what evidence to gather
Agreeing on who can investigate
All of the above
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Network forensics involves the investigation of network traffic in order to identify evidence of a cyber attack
True
False
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Who do we need to agree the network-testing methodology with?
The senior management team.
The forensic supervisory and investigatory authority.
The head of IT services.
The board of directors.
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
By law, does an organisation require permission from users before scanning the communications over its local network?
Yes
No
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?