IP Address Of A Remote Computer Trivia Quiz

316 Questions | Total Attempts: 104

SettingsSettingsSettings
Please wait...
IP Address Quizzes & Trivia

Questions and Answers
  • 1. 
    Exchange server email header information is located here.
    • A. 

      PRIV.STM

    • B. 

      PRIV.EDB

    • C. 

      PUB.EDB

    • D. 

      PRIB.EDB

  • 2. 
    UTC stands for:
    • A. 

      Universal Coordinate Tasks

    • B. 

      Coordinated Universal Time

    • C. 

      Coordinated User Time

    • D. 

      Universal Computer Time

  • 3. 
    The forensic investigator uses this command to see what sessions are open.
    • A. 

      Net session 

    • B. 

      Net open

    • C. 

      Net run

    • D. 

      Net sessioning

    • E. 

      Option 5

  • 4. 
    This is a type of anti-forensic technique with malware.
    • A. 

      Packing

    • B. 

      Vacationing

    • C. 

      $Rxyte provisioning

    • D. 

      Static analysis

  • 5. 
    This does not use OLE.
    • A. 

      Word

    • B. 

      Excel

    • C. 

      PDF

    • D. 

      MS Office

  • 6. 
    This verifies the file system integrity of a volume, fixes logical file system errors, and is similar to the fsck command in unix.
    • A. 

      RegEdit

    • B. 

      CHKDSK

    • C. 

      Disk Integrity

    • D. 

      Lsck

  • 7. 
    The investigator is looking to detect something after the incident has ended.
    • A. 

      Real-time analysis

    • B. 

      Post-trial analysis

    • C. 

      Post-mortem analysis

    • D. 

      After-action anaylsis

  • 8. 
    A hacker commits a DDoS attack against a specific IP address of a company's Web server. This is considered what type of attack?
    • A. 

      APT attack

    • B. 

      Network attack

    • C. 

      Web application attack

    • D. 

      Ids attack

  • 9. 
    What file type is this? FF D8 FF E1
    • A. 

      BMP

    • B. 

      JPEG

    • C. 

      GIF

    • D. 

      PNG

  • 10. 
    This tasklist command specifies the name or IP address of a remote computer.
    • A. 

      /v

    • B. 

      /s

    • C. 

      /u

    • D. 

      /r

  • 11. 
    You can use this to see the last access time change for win10
    • A. 

      Devcon

    • B. 

      Fsutil

    • C. 

      Wmic service

    • D. 

      Reg.exe

    • E. 

      Option 5

  • 12. 
    This displays all commands stored in memory.
    • A. 

      Memory key command

    • B. 

      Doskey history

    • C. 

      -l display

    • D. 

      Regedit

  • 13. 
    GIF has how many bits per pixel
    • A. 

      16

    • B. 

      24

    • C. 

      8

    • D. 

      32

  • 14. 
    Jv16 tool is used for
    • A. 

      Malware reversing

    • B. 

      Dynamic analysis

    • C. 

      Registry

    • D. 

      Bit-to-bit mapping

  • 15. 
    You can detect Trojans with which of the following?
    • A. 

      Tripwire

    • B. 

      Capsa

    • C. 

      Belkasoft RAM Cap

    • D. 

      Regshot

  • 16. 
    A web analytics solution for small and medium sized websites.
    • A. 

      Clickfunnels

    • B. 

      Deep Log Analyzer

    • C. 

      XRY log

    • D. 

      LAN Who

  • 17. 
    This contains the manufacturer's information
    • A. 

      ICCID

    • B. 

      ESN

    • C. 

      EIR

    • D. 

      IMSI

  • 18. 
    You can view DBX files in:
    • A. 

      Adobe Acrobat Reader

    • B. 

      Thunderbird

    • C. 

      MS Outlook Express

    • D. 

      Thundercats

  • 19. 
    When a FAT file is deleted, what is placed at the front?
    • A. 

      ELH

    • B. 

      E5H

    • C. 

      EH5

    • D. 

      ESH

  • 20. 
    This can do data acquisition and duplication.
    • A. 

      Capsa

    • B. 

      Drivespy

    • C. 

      Wireshark

    • D. 

      Xplico

  • 21. 
    A deleted file in the Recycle Bin is named RIYH6VR.doc. This tells us:
    • A. 

      The file was deleted from the Y drive in the 6th order

    • B. 

      The deleted file is a document file

    • C. 

      The file was deleted with Recuva

    • D. 

      None of the above

  • 22. 
    This is an IDS:
    • A. 

      Kismet

    • B. 

      Snort

    • C. 

      Accountix Pro

    • D. 

      Nikto 1000

  • 23. 
    The $l file contains all of the following EXCEPT:
    • A. 

      The original file size

    • B. 

      The date the file was sent to the recycle bin

    • C. 

      The length of the files as 344 bytes long

    • D. 

      The original file path

  • 24. 
    This has journaling:
    • A. 

      Ext1

    • B. 

      NTFS

    • C. 

      FAT

    • D. 

      FAT32

  • 25. 
    A small law firm suspects an incident, where there was potential criminal action, and wants to investigate themselves.  Why should they avoid doing so? (choose the best answer)
    • A. 

      Law firms should not perform digital forensic investigations

    • B. 

      They may alter the date or timestamp information of the evidence

    • C. 

      They can prosecute the attack

    • D. 

      They have a conflict of interest, since they are involved in real estate law

Back to Top Back to top