Skip to main content

MSTM5003 Week 6 Quiz

 Authentication was a one-way process for SSL v1 and v2, with only the server providing authentication.

Correct answer:

Results for question 2.

1.5 / 1.5 points
A browser helper object (BHO) has unrestricted access to the Internet Explorer event model and can perform tasks such as capturing keystrokes.
Correct answer:

Results for question 3.

1.5 / 1.5 points
Which protocol is used for the transfer of hyperlinked data over the Internet, from web servers to browsers?
Correct answer:

Results for question 4.

1.5 / 1.5 points
Which plug-in helps a browser maintain an HTTPS connection and gives a warning when it is not present?
Correct answer:

Results for question 5.

1.5 / 1.5 points
Which attack works on both SSL and TLS by transparently converting the secure HTTPS connection into a plain HTTP connection, removing the transport layer encryption protections?
Correct answer:

Results for question 6.

1.5 / 1.5 points
Which statement correctly describes SSL v3 and TLS authentication?
Correct answer:

Results for question 7.

1.5 / 1.5 points
FTP encrypts traffic by default.
Correct answer:

Results for question 8.

1.5 / 1.5 points
Which browser plug-in allows the user to determine which domains have trusted scripts?
Correct answer:

Results for question 9.

1.5 / 1.5 points
What application is associated with TCP Ports 989 and 990?
Correct answer:

Results for question 10.

1.5 / 1.5 points
What is the goal of TCP?
Correct answer:

Results for question 11.

1.5 / 1.5 points
The term __________ describes a series of digits near the beginning of the file that provides information about the file format.
Correct answer:

Results for question 12.

1.5 / 1.5 points
Evidence that is material to the case or has bearing on the matter at hand is known as __________.
Correct answer:

Results for question 13.

1.5 / 1.5 points
Evidence that must be legally qualified and reliable is known as __________.
Correct answer:

Results for question 14.

1.5 / 1.5 points
Minor procedural missteps have no legal consequences provided the overall investigation is properly conducted.
Correct answer:

Results for question 15.

0 / 1.5 points
What is a software bomb?
Incorrect answer:
Correct Answer:
Software that can destroy or modify files when commands are executed on the computer

Results for question 16.

1.5 / 1.5 points
Both forensics and e-discovery are secondary processes from a business perspective.
Correct answer:

Results for question 17.

1.5 / 1.5 points
Oral testimony that proves a specific fact with no inferences or presumptions is which type of evidence?
Correct answer:

Results for question 18.

1.5 / 1.5 points
When analyzing computer storage components, the original system should be analyzed.
Correct answer:

Results for question 19.

1.5 / 1.5 points
When performing forensics on a computer system, you should use the utilities provided by that system.
Correct answer:

Results for question 20.

1.5 / 1.5 points
From a forensics perspective, Linux systems have the same artifacts as Windows systems.
Correct answer:

Comments

Popular posts from this blog

IS5203 Type 2 Post Assessment and Final Quiz

  Carlos has just created a new subnet for the finance department. He needs to be able to allow the employees in finance to retrieve files from the sales server, which is located in another subnet. Which of the following OSI model layers would it be necessary to categorize the device into? a. Layer 4 b. Layer 6 c. Layer 2 d. Layer 3 All of the cubicles in a company's office have cables that run up to the ceiling and across to an IDF. Inside the IDF, they connect directly to the latest generation switch available from the networking equipment vendor that they have chosen. Which of the following describes the physical topology most likely in use? a. mesh

GE5103-2 Project Management [Aug 23 Syllabus]

    Some of the advantages of using time boxes and cycles in project coordination efforts include creating urgency, measuring progress, and allowing for predictable measurements. A)        True 2.    Even though most project managers are not contract specialists, they need to understand the process well enough to coordinate with the team. For the current assignment, you are looking at a short-term and small effort with a contractor of just a few hours without significant clarity. Which of the following would be the most applicable contract to use in this situation? A)        Time and materials 3. The project you are working on has had modifications to the plan from the start and even how the project is run. Project governance covers all of the 3 following except: A)        Naming The project manager 4. Of the following, which is most likely a trigger condition defined early in the project? A) Alerting Governance board if 10 percent over schedule 5. Of the following options, which stand

IS5213 Data Science and Big Data Solutions

WEEK- 2 code  install.packages("dplyr") library(dplyr) Rajeshdf = read.csv('c:\\Insurance.csv') str(Rajeshdf)                        str(Rajeshdf) summary(Rajeshdf) agg_tbl <- Rajeshdf %>% group_by(Rajeshdf$JOB) %>%    summarise(total_count=n(),             .groups = 'drop') agg_tbl a = aggregate( x=Rajeshdf$HOME_VAL, by=list( Rajeshdf$CAR_TYPE), FUN=median, na.rm=TRUE ) a QUIZ 2. What famous literary detective solved a crime because a dog did not bark at the criminal? A). Sherlock Holmes 1.  In the Insurance data set, how many Lawyers are there? A).  1031 3. What two prefixes does the instructor use for variables when fixing the missing values? Select all that apply. A). IMP_ M_ 4. What is the median Home Value of a person who drives a Van? A).  204139 5. In the insurance data set, how many missing (NA) values does the variable AGE have? A) 7   1. What is the process called where missing data is fixed? a). Imputing   2. According to the instructor