The following is a list of questions to help you test your knowledge regarding this chapter's material. You will find the answers in the Assessments section of the Appendix:
- Which of the following branches of forensics can assist in determining whwther a network is being attacked?
- Broadcast forensics
- Network forensics
- Computer forensics
- Traffic forensics
- Which of the following can be used for performing live acquisition via a bootable CD?
- Helix
- DTDD
- Inquisitor
- Neon
- Which of the following can be used to examine network traffic?
- Netdump
- Slackdump
- Coredump
- Tcpdump
- Which of the following is a part of Sysinternals?
- EnCase
- PsTools
- R-Tools
- Knoppix
-
Which of the following is a network IDS that can be used to perform packet capture and analysis in real time?
- Ethereal
- Snort
- Tcpdump
- John
- Which OSI model layer do most packet sniffers operate on?
- 1
- 3
- 5
- 7
- Packet sniffers can generally read which of the following formats?
- SYN
- DOPI
- PCAP
- AIAT
- Which of the following...