Deck 3: Investigative Techniques and Digital Evidence in Crime Investigations
سؤال
سؤال
سؤال
سؤال
سؤال
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/5
العب
ملء الشاشة (f)
Deck 3: Investigative Techniques and Digital Evidence in Crime Investigations
1
Security Measures Needed to protect ________ during their transmission
A)file
B)data
C)packet
D)all of above
A)file
B)data
C)packet
D)all of above
data
2
__________ means knowledge obtained from investigation, study , intelligence new ,facts .
A)security
B)data
C)information
D)none of these
A)security
B)data
C)information
D)none of these
information
3
Protection against Denial by one of these parties in a communication refers to?
A)non-repudiation
B)data integrity
C)authentication
D)none of these
A)non-repudiation
B)data integrity
C)authentication
D)none of these
non-repudiation
4
Which One of them is Passive attack?
A)denial of service
B)modify message in transit
C)replay previous message
D)obtain message contain
A)denial of service
B)modify message in transit
C)replay previous message
D)obtain message contain
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 5 في هذه المجموعة.
فتح الحزمة
k this deck
5
What is lying of IP address called as?
A)ip spoofing
B)ip scamming
C)ip lying
D)none of theses
A)ip spoofing
B)ip scamming
C)ip lying
D)none of theses
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 5 في هذه المجموعة.
فتح الحزمة
k this deck

