Network Forensics Midterm

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/23

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

24 Terms

1
New cards

What is network forensics?

The science of discovering and retrieving information from network traffic.

2
New cards

At what layer of the OSI model do major protocols operate?

The 4th layer (TCP and UDP)

3
New cards

What is deep packet inspection?

Analyzes application-layer data.

4
New cards

What does DPI stand for?

Deep Packet Inspection. A method of network traffic analysis that examines the data payload of packets, in addition to the header information, to identify, classify, and control traffic

5
New cards

What are the steps in a TCP handshake?

SYN, SYN-ACK, ACK, with sequence numbers SYN=1 and ACK=2.

6
New cards

What is the MAC address and at what OSI layer does it operate?

The Medium Access Control (MAC) address operates at the 2nd layer and is 48 bits long.

7
New cards

What is the function of a DNS lookup?

To send a request to the DNS server, which returns the IP address of a website.

8
New cards

What port does DNS run over?

Port 53.

9
New cards

How many flags does the TCP handshake use?

Only 2 flags.

10
New cards

What is DDoS?

Generates a lot of traffic on one port.

11
New cards

What field in a packet header indicates how long a packet can stay alive?

TTL (Time to Live).

12
New cards

What is soft computing?

Approximate solutions

13
New cards

What is a scanning tool?

Identifies open ports and services

14
New cards

What tools are commonly used to monitor network traffic?

Intrusion Detection Systems (IDS) such as Snort.

15
New cards

What is encryption?

Transforms a message into an unreadable format.

16
New cards

What is a basic file format in networking?

.pcap for packet capture files.

17
New cards

What is a challenge with IP traceback?

Determining who spoofed the IP address.

18
New cards

Misuse Detection

a security process that identifies and detects known attacks by comparing current activity against a database of known malicious patterns or signatures

19
New cards

Anomaly Detection

the process of identifying unusual data points or events that deviate from a normal pattern

20
New cards

What is NetFlow?

Operates at the 2nd or 3rd layers

21
New cards

What is port scanning?

Checks every port

22
New cards

What is hard computing?

Requires precise solutions

23
New cards

What is a vulnerability assessment tool?

Evaluates security weaknesses.

24
New cards

What is encoding?

Translates a known language