Ch 14 Digital Forensic Analysis
3 years ago
Host a game
Live GameLive
Solo Practice
17 QuestionsShow answers
  • Question 1
    30 seconds

    For forensic accountants, it is important to understand the Internet’s protocols so that they:

    answer choices

    Can write code to collect courtroom evidence.

    Can hire a professional to handle the problem.

    Understand electronic courtroom procedures.

    Understand the nature of a cyber attack.

  • Question 2
    30 seconds
    Q. Datagrams are:
    answer choices
    Unchanged as they move across the Internet.
    Another term used to describe e-mail messages.
    Packets of message verification data.
    Packets of data.
  • Question 3
    30 seconds
    Q. Message integrity in the OSI Model used in TCP/IP is performed by the:
    answer choices
    Data link layer.
    Transportation layer.
    Application layer.
    Network layer.
  • Question 4
    30 seconds
    Q. What protocol uses “send and forget” messages over the Internet?
    answer choices
  • Question 5
    30 seconds

    The number of ports on a web server are:

    answer choices




    Indefinite number.

  • Question 6
    30 seconds
    Q. The IP address is composed of a(n):
    answer choices
    8-bit address.
    1-bit address.
    32-bit address.
    64-bit address.
  • Question 7
    30 seconds
    Q. A network computer’s MAC address is found in the:
    answer choices
    ARP table.
    URL address.
    Domain name system.
  • Question 8
    30 seconds

    TCPDUMP is a:

    answer choices

    Traceroute program.

    Virus program.


    Trojan horse.

  • Question 9
    30 seconds
    Q. To trace an IP address back to its source address, which of the following tools would be best to use?
    answer choices
    TCP Dump.
  • Question 10
    30 seconds
    Q. One way to hide my e-mail address is to:
    answer choices
    Use a different PC than normally used to send my e-mail message.
    Use a proxy server for sending e-mail.
    Use a remailer.
    None of the above. 
  • Question 11
    30 seconds
    Q. Route control occurs in which OSI layer?
    answer choices
    Application Layer.
    Session Layer.
    Network Layer.
    Transportation Layer.
  • Question 12
    30 seconds
    Q. ICMP is best described as service:
    answer choices
    For datagrams
    To identify and translate MAC addresses.
    Used for error control messages between machines.
    To control routing between hosts.
  • Question 13
    30 seconds
    Q. How many packets are exchanged in the initial handshaking exchange in setting up a connection?
    answer choices
  • Question 14
    30 seconds
    Q. What is the most common way financial frauds are discovered today?
    answer choices
    By auditors, preparing financial reports.
    By digital investigators.
    Tips from third parties.
    SEC investigations.
  • Question 15
    30 seconds
    Q. If unauthorized spam is being sent through a company’s network, the most important job of an accountant Is to:
    answer choices
    identify who is sending the spam
    shut down the company’s access to the Internet to curtail financial losses
    determine the dollar amount of the financial loss experienced by the company
    call law enforcement for assistance
  • Question 16
    30 seconds
    Q. Pretexting is:
    answer choices
    This occurs when teenagers send compromising photos of themselves to their friends
    This is when a cell phone user pretends to be someone else and uses a false scenario (story) to collect personal data about a person.
    This is a system whereby a text message is compose on one date but not sent out until a later date
    This is a method of saving a string of URLs while using a search engine such as Google or Bing
  • Question 17
    30 seconds
    Q. Computers on a network have either a static or __________________IP address.
    answer choices
Report Quiz
Join a game