Deck 3: Investigative Techniques and Digital Evidence in Crime Investigations

ملء الشاشة (f)
exit full mode
سؤال
Security Measures Needed to protect ________ during their transmission

A)file
B)data
C)packet
D)all of above
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
__________ means knowledge obtained from investigation, study , intelligence new ,facts .

A)security
B)data
C)information
D)none of these
سؤال
Protection against Denial by one of these parties in a communication refers to?

A)non-repudiation
B)data integrity
C)authentication
D)none of these
سؤال
Which One of them is Passive attack?

A)denial of service
B)modify message in transit
C)replay previous message
D)obtain message contain
سؤال
What is lying of IP address called as?

A)ip spoofing
B)ip scamming
C)ip lying
D)none of theses
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/5
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 3: Investigative Techniques and Digital Evidence in Crime Investigations
1
Security Measures Needed to protect ________ during their transmission

A)file
B)data
C)packet
D)all of above
data
2
__________ means knowledge obtained from investigation, study , intelligence new ,facts .

A)security
B)data
C)information
D)none of these
information
3
Protection against Denial by one of these parties in a communication refers to?

A)non-repudiation
B)data integrity
C)authentication
D)none of these
non-repudiation
4
Which One of them is Passive attack?

A)denial of service
B)modify message in transit
C)replay previous message
D)obtain message contain
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 5 في هذه المجموعة.
فتح الحزمة
k this deck
5
What is lying of IP address called as?

A)ip spoofing
B)ip scamming
C)ip lying
D)none of theses
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 5 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 5 في هذه المجموعة.