Deck 9: Internet and Network Forensics and Intrusion Detection
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Question
Match between columns
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/32
Play
Full screen (f)
Deck 9: Internet and Network Forensics and Intrusion Detection
1
What is designed to collect data straight from the network media?
A)Packet analyzers
B)Packet sniffers
C)Packet sifters
D)Packet lifters
A)Packet analyzers
B)Packet sniffers
C)Packet sifters
D)Packet lifters
B
2
Which of the following is considered the BEST answer in defining DHCP?
A)They dynamically assign IP addresses.
B)They dynamically assign IP addresses to servers.
C)They dynamically assign IP addresses to computers.
D)They dynamically assign IP addresses to computers on a network.
A)They dynamically assign IP addresses.
B)They dynamically assign IP addresses to servers.
C)They dynamically assign IP addresses to computers.
D)They dynamically assign IP addresses to computers on a network.
D
3
Which of the following is NOT a component of an NFAT system?
A)Agents
B)Server
C)Logs
D)Examiner computer
A)Agents
B)Server
C)Logs
D)Examiner computer
C
4
NFAT tools discussed in this chapter include all of the following features EXCEPT
A)Real-time network data capture
B)Command-line interface
C)Content analysis
D)Reporting
A)Real-time network data capture
B)Command-line interface
C)Content analysis
D)Reporting
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
5
Which type of firewall acts as a mediator between internal hosts and external connections such as the Internet?
A)Network layer firewall
B)Application layer firewall
C)Proxy firewall
D)Internet firewall
A)Network layer firewall
B)Application layer firewall
C)Proxy firewall
D)Internet firewall
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
6
What is considered as the first attempt to address the increasing number of attacks on networks?
A)MIDs
B)GUIDs
C)NATs
D)IDSs
A)MIDs
B)GUIDs
C)NATs
D)IDSs
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
7
?What is considered as the primary problem associated with enterprise-level IDS tools?
A)The slowing of the network
B)The complexity of the program
C)The amount of data collected
D)The cost
A)The slowing of the network
B)The complexity of the program
C)The amount of data collected
D)The cost
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
8
What is considered to be the first line of defense for networks?
A)IDSs
B)Firewalls
C)Routers
D)Switches
A)IDSs
B)Firewalls
C)Routers
D)Switches
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
9
The ________ is a major source of forensic data in both the stand-alone and network forensic fields.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
10
NFAT systems generally require large amounts of storage space,such as a(n)________ system.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
11
An IDS is considered by most system administrators to be a(n)________ security system.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
12
A(n)________ is the standard operation procedures of the network when it is running normally.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following data-capture methods uses a filtering system approach?
A)Stop,look,and listen
B)Catch it as you can
C)Filter as you scan
D)Detect and filter
A)Stop,look,and listen
B)Catch it as you can
C)Filter as you scan
D)Detect and filter
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
14
The newest NFAT systems are a combination of
A)IDS and application software
B)IDS and forensic software
C)Agents and application software
D)DHCP servers and IDSs
A)IDS and application software
B)IDS and forensic software
C)Agents and application software
D)DHCP servers and IDSs
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
15
What device holds two network interface cards and records all data passing through it?
A)WAP
B)TAP
C)SPAN
D)Host inline device
A)WAP
B)TAP
C)SPAN
D)Host inline device
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
16
The NFAT software usually contains a query language such as
A)IMS
B)IIS
C)SQL
D)PHP
A)IMS
B)IIS
C)SQL
D)PHP
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
17
Identifying situations such as regular spikes in late-night traffic is an example of
A)Pattern analysis
B)Content analysis
C)Playback analysis
D)Timeline sequencing analysis
A)Pattern analysis
B)Content analysis
C)Playback analysis
D)Timeline sequencing analysis
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
18
________ have the capability to map internal IP addresses in such a way that they appear to be part of another network.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
19
Using an NFAT system,an event or security breach can be
A)Detected
B)Monitored
C)Traced in real-time
D)All are correct
A)Detected
B)Monitored
C)Traced in real-time
D)All are correct
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
20
Determining the date and time of an event can be a problem with multiple devices on a network because
A)Only certain devices record dates and times
B)Device clocks tend to drift slightly
C)It can be a challenge to locate where the date and time are recorded
D)Time stamps cannot be used for network devices
A)Only certain devices record dates and times
B)Device clocks tend to drift slightly
C)It can be a challenge to locate where the date and time are recorded
D)Time stamps cannot be used for network devices
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
21
________ transmit and receive data via radio frequency in the open.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
22
________ Software allows you to forensically search for data on your entire network using nothing more than keywords or phrases.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
23
Software clients called ________ installed on network devices are designed to collect information from the host.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
24
________ analysis is also known as deep packet inspection.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
25
NFAT software can be configured to accept input from almost any device that generates a(n)________ file.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
26
A(n)________ repeats all data received on any port to the remaining ports;it is gradually being replaced by switches and SPAN systems.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
27
The generation of logs on devices such as routers,proxies,and firewalls should always be set to the ________ at which your network can operate.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
28
The feature of modern switches called ________ duplicates the information going into a port to the SPAN port.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
29
A problem that can occur with IDS alerts is ________,when an IDS mistakenly flags an innocent file as being suspicious.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
30
_______ Software has taken steps to preserve the integrity of the data collected from the agents via encryption both from agent to server and from the examiner's station to server.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
31
Match between columns
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
32
Match between columns
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck