Digital Forensics Concepts Coursera Quiz Answers

Get All Weeks Digital Forensics Concepts Coursera Quiz Answers

Digital Forensics Concepts Coursera Quiz Answers

Week 1

Quiz 1:

Q1. A network is defined as a what?

  • a collection of files linked together for communication and sharing of data and other resources
  • A collection of computers linked together for communication and sharing of data and other resources
  • A collection of networks linked together for communication and sharing of data and other resources
  • A collection of programs linked together for communication and sharing of data and other resources

Q2. A LAN is a what?

  • Large Area Network
  • Legal Area Network
  • Long Area Network
  • Local Area Network

Q3. A packet has a header, a footer and a payload. The payload contains what?

  • A CRC redundancy check
  • Destination IP address
  • The packet data
  • The source IP address

Q4. Routers use what to route packets to their destination?

  • ARP
  • DNS
  • IP addresses
  • MAC addresses

Q5. _______have multiple connections. They pass on anything received on one connection to all other connections (no filtering by IP or MAC address).

  • Ports
  • Routers
  • Hubs
  • Switches

Q6. Switches use what to route packets to their destination address?

  • IP addresses
  • MAC addresses
  • Cables
  • Ports

Q7. IP V4 is a set of __ numbers (32 bits) separated by dots in sets of three.

  • 5
  • 3
  • 14
  • 12

Q8. NAT translates the ___________of devices in a local network to a single public IP address and vice versa

  • Public IP address
  • MAC addresses
  • Private IP addresses
  • Port numbers

Q9. What translates the alphanumeric web address into an IP address or vice versa?

  • Port forwarding
  • ARP
  • FTP
  • DNS

Q10. A __ address is a hardware identification number that uniquely identifies each device on a network.

  • DNS
  • IP
  • ARP
  • MAC

Q11. A _ is a set of rules that dictate how data is transmitted between devices in a network.

  • Router protocol
  • Network protocol
  • Internet protocol
  • Hub protocol

Q12. What is the principal communications protocol in the internet protocol suite for relaying data across network boundaries?

  • SMTP
  • IP
  • FTP
  • UDP

Q13. __ is a communications standard that allows computing devices to exchange messages over a network.

  • TCP
  • SSH
  • DNS
  • UDP

Q14. TCP is a _ -oriented protocol.

  • Network
  • Connection
  • Connection-less
  • UDP

Q15. _ is a connectionless protocol and doesn’t guarantee delivery.

  • HTTP
  • FTP
  • TCP
  • UDP

Q16. __ is a protocol used to map IP addresses to the hardware addresses (MAC addresses).

  • IP
  • TCP
  • ARP
  • UDP

Q17. __ is the lowest layer of the OSI Model. It covers electrical and physical compounds of the system, including cables and the radio frequency link (as in an 802.11 wireless systems).

  • Physical layer
  • Network layer
  • Transport layer
  • Data Link Layer

Q18. What is NOT something a forensic examiner needs to consider when developing a keyword search list?

  • The computer operating system
  • Elements of the allegation
  • Existing leads and associates
  • Suspect’s personal information

Q19. What are the two categories of keywords?

  • Case-specific keywords and generic case keywords
  • The suspect’s personal information
  • The NSRL and notables
  • File and directory types

Q20. Generic case keywords are what?

  • Keywords that can be used to search for in any case of a certain type
  • Keywords that are specific to one certain case
  • A large list of keywords
  • A large list of hash values

Q21. Case-specific keywords are what?

  • Keywords that relate to one specific case
  • Keywords that relate to a case of a certain type
  • An alphanumeric keyword list
  • A keyword list with hash values

Q22. The limitations of keyword searches do NOT include what?

  • Plaintext
  • Bit-shifted
  • Encrypted
  • Compressed

Q23. This regular expression below can be used to locate what? grep ‘([0-9]{3})|[0-9]{3}([0−9]{3})∥[0−9]{3}[ -.]\?[0-9]{3}[ -.]\?[0-9]{4}’ Test.txt

  • IP addresses
  • MAC addresses
  • Phone numbers
  • URLs

Q24. Report writing preparation includes what?

  • Using a write blocker
  • Good note-taking
  • Using grep searches
  • A search warrant

Q25. Parts of a written report include what?

  • Search warrant
  • Photos
  • Narrative and exhibits
  • Files and folders

Q26. Reporting considerations do NOT include what?

  • Answering all investigative questions
  • Software tools and versions used during the exam
  • Supporting your opinions with artifacts
  • A list of every file in the case

Q27. A consideration when using software tool generated reports is what?

  • These reports are hard to generate
  • These reports are very costly
  • These reports are not customizable
  • These reports may contain unneeded and/or unwanted information

Q28. Peer review is defined as what?

  • Allowing a peer to write the case report
  • When the same investigator proofreads their own report
  • An evaluation conducted by a second qualified examiner of reports, notes, data, conclusions and other documents
  • An evaluation conducted by a less qualified examiner of reports, notes, data, conclusions and other documents

Q29. __ are a known technique for reducing errors.

  • Peer reviews
  • Software tool-generated reports
  • Hash values
  • Well-written reports

Get All Course Quiz Answers of Computer Forensics Specialization

Digital Forensics Concepts Coursera Quiz Answers

Windows OS Forensics Coursera Quiz Answers

Windows Registry Forensics Coursera Quiz Answers

Team Networking Funda
Team Networking Funda

Welcome to the official Author Page of Team Networking Funda! Here, we are dedicated to unraveling the intricate world of networking, connectivity, and team dynamics. Our mission is to provide you with insightful, actionable advice and solutions that will help you build strong connections, foster collaboration, and achieve success in all aspects of your professional life.

🌐 Networking Insights: Dive into the art of networking with us, as we explore strategies, tips, and real-world examples that can elevate your networking game. Whether you're a seasoned pro or just starting, we have valuable insights to offer.

🤝 Team Synergy: Discover the secrets to creating high-performing teams. We delve into team dynamics, leadership, and communication to help you unlock the full potential of your team and achieve outstanding results.

🚀 Professional Growth: Explore the tools and techniques that can accelerate your professional growth. From career development to personal branding, we're here to guide you toward achieving your goals.

🌟 Success Stories: Be inspired by success stories, case studies, and interviews with experts who have mastered the art of networking and teamwork. Learn from their experiences and apply their insights to your journey.

💬 Engage and Connect: Join the conversation, leave comments, and share your own networking and team-building experiences. Together, we can create a vibrant community of like-minded professionals dedicated to growth and success.

Stay tuned for a wealth of resources that will empower you to excel in your professional life. We're here to provide you with the knowledge and tools you need to thrive in today's interconnected world.

We are Team Networking Funda, a group of passionate authors and networking enthusiasts committed to sharing our expertise and experiences in the world of networking and team building. With backgrounds in [Your Background or Expertise], we bring a diverse range of perspectives and insights to help you navigate the challenges and opportunities of professional networking and teamwork.

Leave a Reply

Your email address will not be published. Required fields are marked *

error: Content is protected !!