JavaScript isn't enabled in your browser, so this file can't be opened. Enable and reload.
Chapter 11 Review
Sign in to Google
to save your progress.
Learn more
* Indicates required question
Why are MAC addresses important pieces of evidence?
*
Your answer
Why might a network forensic investigator place a network adapter in promiscuous mode?
*
Your answer
Explain why wireless access points are commonly used in corporate environments instead of wireless routers, which are primarily used in small office home offices (SOHO).
*
Your answer
Explain the difference between an IDS and an IPS.
*
Your answer
What is the difference between a DoS attack and a RDoS attack?
*
Your answer
Why are most network forensic investigations performed postmortem?
*
Your answer
Why are data breaches more impactful on customers than DoS or DDoS attacks?
*
Your answer
Why should network professionals review the US-CERT bulletin on a weekly basis?
*
Your answer
How might a hacker use a rogue access point?
*
Your answer
What problems do PoE devices pose in terms of transport?
*
Your answer
What is the purpose of a CAPTCHA?
*
Your answer
What types of evidence can be found in WAP logs?
*
Your answer
Why is NTP so important to network forensic investigations?
*
Your answer
How can copy machines contain rich sources of evidence?
*
Your answer
How does ransomware block access to network resources?
*
Your answer
Submit
Clear form
Never submit passwords through Google Forms.
This form was created inside of Pioneer Technology Center.
Does this form look suspicious?
Report
Forms
Help and feedback
Contact form owner
Help Forms improve
Report