Get All Weeks Digital Forensics Concepts Coursera Quiz Answers
Table of Contents
Digital Forensics Concepts Week 01 Quiz Answers
Q1. A network is defined as a what?
- a collection of files linked together for communication and sharing of data and other resources
- A collection of computers linked together for communication and sharing of data and other resources
- A collection of networks linked together for communication and sharing of data and other resources
- A collection of programs linked together for communication and sharing of data and other resources
Q2. A LAN is a what?
- Large Area Network
- Legal Area Network
- Long Area Network
- Local Area Network
Q3. A packet has a header, a footer, and a payload. The payload contains what?
- A CRC redundancy check
- Destination IP address
- The packet data
- The source IP address
Q4. Routers use what to route packets to their destination?
- ARP
- DNS
- IP addresses
- MAC addresses
Q5. _______have multiple connections. They pass on anything received on one connection to all other connections (no filtering by IP or MAC address).
- Ports
- Routers
- Hubs
- Switches
Q6. Do switches use what to route packets to their destination address?
- IP addresses
- MAC addresses
- Cables
- Ports
Q7. IP V4 is a set of __ numbers (32 bits) separated by dots in sets of three.
- 5
- 3
- 14
- 12
Q8. NAT translates the ___________of devices in a local network to a single public IP address and vice versa
- Public IP address
- MAC addresses
- Private IP addresses
- Port numbers
Q9. What translates the alphanumeric web address into an IP address or vice versa?
- Port forwarding
- ARP
- FTP
- DNS
Q10. A __ address is a hardware identification number that uniquely identifies each device on a network.
- DNS
- IP
- ARP
- MAC
Q11. A _ is a set of rules that dictate how data is transmitted between devices in a network.
- Router protocol
- Network protocol
- Internet protocol
- Hub protocol
Q12. What is the principal communications protocol in the Internet protocol suite for relaying data across network boundaries?
- SMTP
- IP
- FTP
- UDP
Q13. __ is a communications standard that allows computing devices to exchange messages over a network.
- TCP
- SSH
- DNS
- UDP
Q14. TCP is a _ -oriented protocol.
- Network
- Connection
- Connection-less
- UDP
Q15. _ is a connectionless protocol and doesn’t guarantee delivery.
- HTTP
- FTP
- TCP
- UDP
Q16. __ is a protocol used to map IP addresses to the hardware addresses (MAC addresses).
- IP
- TCP
- ARP
- UDP
Q17. __ is the lowest layer of the OSI Model. It covers the electrical and physical compounds of the system, including cables and the radio frequency link (as in an 802.11 wireless system).
- Physical layer
- Network layer
- Transport layer
- Data Link Layer
Q18. What is NOT something a forensic examiner needs to consider when developing a keyword search list?
- The computer operating system
- Elements of the allegation
- Existing leads and associates
- Suspect’s personal information
Q19. What are the two categories of keywords?
- Case-specific keywords and generic case keywords
- The suspect’s personal information
- The NSRL and notables
- File and directory types
Q20. Generic case keywords are what?
- Keywords that can be used to search for in any case of a certain type
- Keywords that are specific to one certain case
- A large list of keywords
- A large list of hash values
Q21. Case-specific keywords are what?
- Keywords that relate to one specific case
- Keywords that relate to a case of a certain type
- An alphanumeric keyword list
- A keyword list with hash values
Q22. The limitations of keyword searches do NOT include what?
- Plaintext
- Bit-shifted
- Encrypted
- Compressed
Q23. This regular expression below can be used to locate what? grep ‘([0-9]{3})|[0-9]{3}([0−9]{3})∥[0−9]{3}[ -.]\?[0-9]{3}[ -.]\?[0-9]{4}’ Test.txt
- IP addresses
- MAC addresses
- Phone numbers
- URLs
Q24. Report writing preparation includes what?
- Using a write blocker
- Good note-taking
- Using grep searches
- A search warrant
Q25. Parts of a written report include what?
- Search warrant
- Photos
- Narrative and exhibits
- Files and folders
Q26. Reporting considerations do NOT include what?
- Answering all investigative questions
- Software tools and versions used during the exam
- Supporting your opinions with artifacts
- A list of every file in the case
Q27. A consideration when using software tool generated reports is what?
- These reports are hard to generate
- These reports are very costly
- These reports are not customizable
- These reports may contain unneeded and/or unwanted information
Q28. Peer review is defined as what?
- Allowing a peer to write the case report
- When the same investigator proofreads their own report
- An evaluation conducted by a second qualified examiner of reports, notes, data, conclusions, and other documents
- An evaluation conducted by a less qualified examiner of reports, notes, data, conclusions, and other documents
Q29. __ are a known technique for reducing errors.
- Peer reviews
- Software tool-generated reports
- Hash values
- Well-written reports
Get All Course Quiz Answers for the Computer Forensics Specialization
Digital Forensics Concepts Coursera Quiz Answers
Windows OS Forensics Coursera Quiz Answers
Windows Registry Forensics Coursera Quiz Answers