Digital Forensics Concepts Coursera Quiz Answers

Get All Weeks Digital Forensics Concepts Coursera Quiz Answers

Digital Forensics Concepts Week 01 Quiz Answers

Q1. A network is defined as a what?

  • a collection of files linked together for communication and sharing of data and other resources
  • A collection of computers linked together for communication and sharing of data and other resources
  • A collection of networks linked together for communication and sharing of data and other resources
  • A collection of programs linked together for communication and sharing of data and other resources

Q2. A LAN is a what?

  • Large Area Network
  • Legal Area Network
  • Long Area Network
  • Local Area Network

Q3. A packet has a header, a footer, and a payload. The payload contains what?

  • A CRC redundancy check
  • Destination IP address
  • The packet data
  • The source IP address

Q4. Routers use what to route packets to their destination?

  • ARP
  • DNS
  • IP addresses
  • MAC addresses

Q5. _______have multiple connections. They pass on anything received on one connection to all other connections (no filtering by IP or MAC address).

  • Ports
  • Routers
  • Hubs
  • Switches

Q6. Do switches use what to route packets to their destination address?

  • IP addresses
  • MAC addresses
  • Cables
  • Ports

Q7. IP V4 is a set of __ numbers (32 bits) separated by dots in sets of three.

  • 5
  • 3
  • 14
  • 12

Q8. NAT translates the ___________of devices in a local network to a single public IP address and vice versa

  • Public IP address
  • MAC addresses
  • Private IP addresses
  • Port numbers

Q9. What translates the alphanumeric web address into an IP address or vice versa?

  • Port forwarding
  • ARP
  • FTP
  • DNS

Q10. A __ address is a hardware identification number that uniquely identifies each device on a network.

  • DNS
  • IP
  • ARP
  • MAC

Q11. A _ is a set of rules that dictate how data is transmitted between devices in a network.

  • Router protocol
  • Network protocol
  • Internet protocol
  • Hub protocol

Q12. What is the principal communications protocol in the Internet protocol suite for relaying data across network boundaries?

  • SMTP
  • IP
  • FTP
  • UDP

Q13. __ is a communications standard that allows computing devices to exchange messages over a network.

  • TCP
  • SSH
  • DNS
  • UDP

Q14. TCP is a _ -oriented protocol.

  • Network
  • Connection
  • Connection-less
  • UDP

Q15. _ is a connectionless protocol and doesn’t guarantee delivery.

  • HTTP
  • FTP
  • TCP
  • UDP

Q16. __ is a protocol used to map IP addresses to the hardware addresses (MAC addresses).

  • IP
  • TCP
  • ARP
  • UDP

Q17. __ is the lowest layer of the OSI Model. It covers the electrical and physical compounds of the system, including cables and the radio frequency link (as in an 802.11 wireless system).

  • Physical layer
  • Network layer
  • Transport layer
  • Data Link Layer

Q18. What is NOT something a forensic examiner needs to consider when developing a keyword search list?

  • The computer operating system
  • Elements of the allegation
  • Existing leads and associates
  • Suspect’s personal information

Q19. What are the two categories of keywords?

  • Case-specific keywords and generic case keywords
  • The suspect’s personal information
  • The NSRL and notables
  • File and directory types

Q20. Generic case keywords are what?

  • Keywords that can be used to search for in any case of a certain type
  • Keywords that are specific to one certain case
  • A large list of keywords
  • A large list of hash values

Q21. Case-specific keywords are what?

  • Keywords that relate to one specific case
  • Keywords that relate to a case of a certain type
  • An alphanumeric keyword list
  • A keyword list with hash values

Q22. The limitations of keyword searches do NOT include what?

  • Plaintext
  • Bit-shifted
  • Encrypted
  • Compressed

Q23. This regular expression below can be used to locate what? grep ‘([0-9]{3})|[0-9]{3}([0−9]{3})∥[0−9]{3}[ -.]\?[0-9]{3}[ -.]\?[0-9]{4}’ Test.txt

  • IP addresses
  • MAC addresses
  • Phone numbers
  • URLs

Q24. Report writing preparation includes what?

  • Using a write blocker
  • Good note-taking
  • Using grep searches
  • A search warrant

Q25. Parts of a written report include what?

  • Search warrant
  • Photos
  • Narrative and exhibits
  • Files and folders

Q26. Reporting considerations do NOT include what?

  • Answering all investigative questions
  • Software tools and versions used during the exam
  • Supporting your opinions with artifacts
  • A list of every file in the case

Q27. A consideration when using software tool generated reports is what?

  • These reports are hard to generate
  • These reports are very costly
  • These reports are not customizable
  • These reports may contain unneeded and/or unwanted information

Q28. Peer review is defined as what?

  • Allowing a peer to write the case report
  • When the same investigator proofreads their own report
  • An evaluation conducted by a second qualified examiner of reports, notes, data, conclusions, and other documents
  • An evaluation conducted by a less qualified examiner of reports, notes, data, conclusions, and other documents

Q29. __ are a known technique for reducing errors.

  • Peer reviews
  • Software tool-generated reports
  • Hash values
  • Well-written reports
Get All Course Quiz Answers for the Computer Forensics Specialization

Digital Forensics Concepts Coursera Quiz Answers

Windows OS Forensics Coursera Quiz Answers

Windows Registry Forensics Coursera Quiz Answers

Share your love

Newsletter Updates

Enter your email address below and subscribe to our newsletter

Leave a Reply

Your email address will not be published. Required fields are marked *