Chapter 11 Review
Sign in to Google to save your progress. Learn more
Why are MAC addresses important pieces of evidence? *
Why might a network forensic investigator place a network adapter in promiscuous mode? *
Explain why wireless access points are commonly used in corporate environments instead of wireless routers, which are primarily used in small office home offices (SOHO). *
Explain the difference between an IDS and an IPS. *
What is the difference between a DoS attack and a RDoS attack? *
Why are most network forensic investigations performed postmortem? *
Why are data breaches more impactful on customers than DoS or DDoS attacks? *
Why should network professionals review the US-CERT bulletin on a weekly basis? *
How might a hacker use a rogue access point? *
What problems do PoE devices pose in terms of transport? *
What is the purpose of a CAPTCHA? *
What types of evidence can be found in WAP logs? *
Why is NTP so important to network forensic investigations? *
How can copy machines contain rich sources of evidence? *
How does ransomware block access to network resources? *
Submit
Clear form
Never submit passwords through Google Forms.
This form was created inside of Pioneer Technology Center.

Does this form look suspicious? Report