1. Authentication was a one-way process for SSL v1 and v2, with only the server providing authentication.
True
2. A browser helper object (BHO) has unrestricted access to the Internet Explorer event model and can perform tasks such as capturing keystrokes.
True
3. Which protocol is used for the transfer of hyperlinked data over the Internet, from web servers to browsers?
HTTP
4. Which plug-in helps a browser maintain an HTTPS connection and gives a warning when it is not present?
HTTPS Everywhere
5. Which attack works on both SSL and TLS by transparently converting the secure HTTPS connection into a plain HTTP connection, removing the transport layer encryption protections?
SSL stripping attack
6. Which statement correctly describes SSL v3 and TLS authentication?
In SSL v3/TLS, mutual authentication of both client and server is possible.
7. FTP encrypts traffic by default.
False
8. Which browser plug-in allows the user to determine which domains have trusted scripts?
NoScript
9. What application is associated with TCP Ports 989 and 990?
FTPS
10. What is the goal of TCP?
To send an unauthenticated, error-free stream of information between two computers.
11. The term __________ describes a series of digits near the beginning of the file that provides information about the file format.
magic number
12. Evidence that is material to the case or has bearing on the matter at hand is known as __________.
relevant evidence
13. Evidence that must be legally qualified and reliable is known as __________.
competent evidence
14. Minor procedural missteps have no legal consequences provided the overall investigation is properly conducted.
False
15. What is a software bomb?
Software that can destroy or modify files when commands are executed on the computer
16. Both forensics and e-discovery are secondary processes from a business perspective.
True
17. Oral testimony that proves a specific fact with no inferences or presumptions is which type of evidence?
Direct evidence
18. When analyzing computer storage components, the original system should be analyzed.
False
19. When performing forensics on a computer system, you should use the utilities provided by that system.
False
20. From a forensics perspective, Linux systems have the same artifacts as Windows systems.
False
Other Links:
See other websites for quiz:
Check on QUIZLET
