Deck 23: Digital Evidence on the Internet

ملء الشاشة (f)
exit full mode
سؤال
Who is authorized to conduct online undercover investigations when child pornography is involved?

A) Anyone
B) Computer security professionals
C) Journalists
D) Law enforcement
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
When you access a web page, the content may be located on a server other than the one you accessed.
سؤال
What peer-to-peer clients use the Fast Track network?

A) KaZaA
B) Grokster
C) iMesh
D) All of the above
سؤال
Web Whacker and Httrack are examples of tools that:

A) Search the Web
B) Deface websites
C) Capture websites
D) Launch websites
سؤال
Second Life is one of the better known:

A) Research websites
B) Archive websites
C) Virtual worlds
D) Web-based game shows
سؤال
Synchronous chat networks are particularly conducive to criminal activity because of their

A) Privacy
B) Immediacy
C) Impermanence
D) All of the above
سؤال
Metaverseink is a:

A) Search tool (people or things) for virtual worlds
B) Newsgroup aggregator
C) Social networking meta-tool
D) A file-sharing peer-to-peer network
سؤال
When it is not possible to determine the identity of the author of a Usenet message using IP addresses in the header, what else can you do to learn more about the author?

A) Look for unusual signature and use of language
B) Search the Web using distinctive aspects of posts
C) Look for similar Usenet messages posted using an alias
D) All of the above
سؤال
What are two of the most useful headers for determining the origination of Usenet messages?

A) From and Message-ID
B) NNTP-Posting-Host and X-Trace
C) Path and Subject
D) RFC1036 and RFC2980
سؤال
What characteristics of IRC make it attractive to criminals?

A) IRC enables them to exchange illegal materials with other criminals.
B) IRC provides them with some level of anonymity.
C) IRC gives them direct, "live" access to a large pool of potential victims.
D) All of the above.
سؤال
Which of the following enables a user to connect to IRC and run IRC fserves without disclosing their IP address?

A) Freenet
B) psybnc bot
C) Fserve
D) All of the above
سؤال
The cybertrail is only useful for gathering information about an offender, not a victim.
سؤال
Why is it important to hide your identity when conducting an online investigation?

A) To reduce the risk of alerting the offender
B) To get yourself in the mindset of covert web investigating
C) To make it easier for you to determine the offender's location
D) All of the above
سؤال
Which of the following tools can reconstruct TCP streams?

A) Tcpdump
B) Wireshark
C) Snoop
D) EnCase
سؤال
What information should you document when searching for evidence on the Web?

A) Date/time of search, search engine and terms used, address of pertinent results
B) Screenshots of significant search results
C) Download copies of the webpages and calculate their MD5 value
D) All of the above
سؤال
Whois databases contain contact information relating to IP addresses but not domain names.
سؤال
Which of the following applications leave traces of Internet activities on a personal computer?

A) Internet Explorer
B) KaZaA
C) IRC
D) All of the above
سؤال
All web search engines use the same search syntax.
سؤال
The "invisible Web" can only be accessed by government employees.
سؤال
Which of the following Internet services can be used to exchange illegal materials?

A) IRC
B) Usenet
C) KaZaa
D) All of the above
سؤال
Criminals let their guard down in chat networks because they feel protected by the perceived anonymity.
سؤال
Posting information online takes control of the information away from the person and such information can remain online indefinitely.
سؤال
The Web archive (web.archive.org) contains a complete and accurate copy of web pages as they existed at a particular time.
سؤال
When evidence is located on the Internet, investigators should document and preserve it immediately or it may be gone the next time they look for it.
سؤال
It is not possible to decrypt and view captured network traffic.
سؤال
Pseudonymous e-mail enables the sender to receive responses to messages whereas anonymous e- mail does not.
سؤال
Freenet is not being widely used by criminals to exchange illegal materials because it is too difficult to use.
سؤال
E-mail Received headers can be relied on for tracking purposes because they cannot be forged.
سؤال
Given the wealth of information that social networks contain, digital investigators will often find useful information at these sites.
سؤال
KaZaa has one feature that can be beneficial from an investigative standpoint - whenever possible, it obtains files from peers in the same geographical region.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/30
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 23: Digital Evidence on the Internet
1
Who is authorized to conduct online undercover investigations when child pornography is involved?

A) Anyone
B) Computer security professionals
C) Journalists
D) Law enforcement
D
2
When you access a web page, the content may be located on a server other than the one you accessed.
True
3
What peer-to-peer clients use the Fast Track network?

A) KaZaA
B) Grokster
C) iMesh
D) All of the above
D
4
Web Whacker and Httrack are examples of tools that:

A) Search the Web
B) Deface websites
C) Capture websites
D) Launch websites
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
5
Second Life is one of the better known:

A) Research websites
B) Archive websites
C) Virtual worlds
D) Web-based game shows
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
6
Synchronous chat networks are particularly conducive to criminal activity because of their

A) Privacy
B) Immediacy
C) Impermanence
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
7
Metaverseink is a:

A) Search tool (people or things) for virtual worlds
B) Newsgroup aggregator
C) Social networking meta-tool
D) A file-sharing peer-to-peer network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
8
When it is not possible to determine the identity of the author of a Usenet message using IP addresses in the header, what else can you do to learn more about the author?

A) Look for unusual signature and use of language
B) Search the Web using distinctive aspects of posts
C) Look for similar Usenet messages posted using an alias
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
9
What are two of the most useful headers for determining the origination of Usenet messages?

A) From and Message-ID
B) NNTP-Posting-Host and X-Trace
C) Path and Subject
D) RFC1036 and RFC2980
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
10
What characteristics of IRC make it attractive to criminals?

A) IRC enables them to exchange illegal materials with other criminals.
B) IRC provides them with some level of anonymity.
C) IRC gives them direct, "live" access to a large pool of potential victims.
D) All of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which of the following enables a user to connect to IRC and run IRC fserves without disclosing their IP address?

A) Freenet
B) psybnc bot
C) Fserve
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
12
The cybertrail is only useful for gathering information about an offender, not a victim.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
13
Why is it important to hide your identity when conducting an online investigation?

A) To reduce the risk of alerting the offender
B) To get yourself in the mindset of covert web investigating
C) To make it easier for you to determine the offender's location
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
14
Which of the following tools can reconstruct TCP streams?

A) Tcpdump
B) Wireshark
C) Snoop
D) EnCase
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
15
What information should you document when searching for evidence on the Web?

A) Date/time of search, search engine and terms used, address of pertinent results
B) Screenshots of significant search results
C) Download copies of the webpages and calculate their MD5 value
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
16
Whois databases contain contact information relating to IP addresses but not domain names.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which of the following applications leave traces of Internet activities on a personal computer?

A) Internet Explorer
B) KaZaA
C) IRC
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
18
All web search engines use the same search syntax.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
19
The "invisible Web" can only be accessed by government employees.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which of the following Internet services can be used to exchange illegal materials?

A) IRC
B) Usenet
C) KaZaa
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
21
Criminals let their guard down in chat networks because they feel protected by the perceived anonymity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
22
Posting information online takes control of the information away from the person and such information can remain online indefinitely.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
23
The Web archive (web.archive.org) contains a complete and accurate copy of web pages as they existed at a particular time.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
24
When evidence is located on the Internet, investigators should document and preserve it immediately or it may be gone the next time they look for it.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
25
It is not possible to decrypt and view captured network traffic.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
26
Pseudonymous e-mail enables the sender to receive responses to messages whereas anonymous e- mail does not.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
27
Freenet is not being widely used by criminals to exchange illegal materials because it is too difficult to use.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
28
E-mail Received headers can be relied on for tracking purposes because they cannot be forged.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
29
Given the wealth of information that social networks contain, digital investigators will often find useful information at these sites.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
30
KaZaa has one feature that can be beneficial from an investigative standpoint - whenever possible, it obtains files from peers in the same geographical region.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.