Forensics is the systematic trucking of incoming and outgoing ruffic on  your network
(a) Network  
(b) Computer
(c) Criminal  
(d) Server

1 Answer

Answer :

d) Server

Related questions

Description : A firewall is a network security system ______based that controls incoming and outgoing network traffic based on a set of rules: a) Hardware b) Software c) Both hardware or software d) None of These

Last Answer : c) Both hardware or software

Description : Why should my Skype connection be fast outgoing and slow incoming.

Last Answer : There’s many different variables that come into play. Is there wireless internet? What kind of internet are both of you using? What is your network card set to, full duplex? It really depends.

Description : what- A map is drawn on a coordinate grid, as shown. The line represents an incoming flight path. A plane is about to leave on a perpendicular flight path that runs through the point (0, 4).Which line represents the outgoing flight path?

Last Answer : y= -5x +4

Description : What are Outgoing Calls and Incoming Calls ?

Last Answer : Going out if you call someone. And if someone calls you on your phone, it's called an incoming call.

Description : Which of the following options correctly explains the term heat budget? (1) It is a mode of transfer of heat through matter by molecular activity. (2) It is the balance between incoming and outgoing radiation. ... waves. (4) It is the amount of heat which the surface of earth receives from the sun.

Last Answer : (2) It is the balance between in-coming and outgoing radiation. Explanation: Incoming heat being absorbed by the Earth, and outgoing heat escaping the Earth in the form of radiation are both ... each passing year. This balance between incoming and outgoing heat is known as Earth's heat budget.

Description : Which part acts as a relay station for the incoming and outgoing i pulses to and from the cerebrum?

Last Answer : Thalamus

Description : A layer-4 firewall (a device that can look at all protocol headers up to the transport layer) CANNOT a. block entire HTTP traffic during 9:00PM and 5 :0OAM b. block all ICMP traffic c. stop ... address d. block TCP traffic from a specific user on a multi-user system during 9:00PM and 5:00AM

Last Answer : d. block TCP traffic from a specific user on a multi-user system during 9:00PM and 5:00AM

Description : ______ is a static algorithm in which every incoming packet is sent out on every outgoing line except the one it arrives on. This method usually generates vast number of duplicate packets.. A. Flooding B. Wait and watch C. congestion D. both a and c

Last Answer : A. Flooding

Description : A 'body' which allows the short wavelength incoming solar radiation to enter in, but does not allow long wave length outgoing infra red radiation to escape out is called the (A) Global warming (B) Green house (C) Atmospheric effect (D) Ionosphere

Last Answer : (B) Green house

Description : What is geostrophic balance? (a) The exact balance of incoming SW and outgoing LW radiation at the top of the atmosphere. (b) The exact balance of vertical pressure gradient and gravity in ... friction. (d) The exact balance of the Coriolis force and the horizontal pressure gradient force.

Last Answer : (d) The exact balance of the Coriolis force and the horizontal pressure gradient force.

Description : The Greenhouse Effect is caused primarily by which of the following processes? w) blocking incoming short wave solar energy x) absorbing incoming short wave solar energy y) heating of the Earth's stratosphere z) absorbing outgoing long wave radiation from the Earth

Last Answer : ANSWER: Z -- ABSORBING OUTGOING LONG WAVE RADIATION FROM THE EARTH 

Description : Which of the following options correctly explains the term heat budget? (1) It is a mode of transfer of heat through matter by molecular activity. (2) It is the balance between incoming and outgoing radiation ... waves. (4) It is the amount of heat which the surface of earth receives from the sun.

Last Answer :  It is the balance between incoming and outgoing radiation

Description : Which of the following sciences pay vital role in criminal justice systems ? a. Digital Forensics b. Forensic Science c. PC Forensics d. INTERPOL Forensic

Last Answer : b. Forensic Science

Description : You are a project manager for Move It Now trucking company. Your company specializes in moving household goods across the city or across the country. Your project involves upgrading the nationwide computer network for the ... the weighted average or expected value? A. 54 B. 66 C. 60 D. 30

Last Answer : C. 60

Description : when setting up my gmail account on my iPhone, the outbox settings?, what do I enter in those fields, "outgoing mail server"?

Last Answer : answer:What you may be setting it up as is a other' mail account that is for general POP3/IMAP. You shouldn't encounter that screen if you've chosen Gmail as your account type. You ... require your name, address, and password. Apple Support instructions for setting up e-mail accounts on the iPhone

Description : Which of the following assertions is FALSE about the Internet Protocol (IP)? a. It is possible for a computer to have multiple IP addresses b. IP packets from the same source to the same ... outgoing packets; the route is determined only by the routing tables in the routers on the way

Last Answer : d. The packet source cannot set the route of an outgoing packets; the route is determined only by the routing tables in the routers on the way

Description : What is the incoming mail server for OutlookWebApp?

Last Answer : What type of email address are you trying to set up?? mobile me? yahoo? verizon? etc…. mine prefilled when I put in my email address

Description : Who is the father of Computer Forensics? a. Anderson b. Palmer c. Ciardhuain d. Korn

Last Answer : a. Anderson

Description : which is following father of computer forensics a. M. Anderson b. G. Gunsh c. S. Ciardhuain d. G. Palmar

Last Answer : a. M. Anderson

Description : Digital forensics is all of them except: a. Extraction of computer data. b. Preservation of computer data. c. Interpretation of computer data. d. Manipulation of computer data.

Last Answer : d. Manipulation of computer data.

Description : There are three c's in computer forensics. Which is one of the three? (A) Control (B) Chance (C) Chains (D) Core

Last Answer : A) Control

Description : Digital forensics is all of them except: (A) Extraction of computer data. (B) Preservation of computer data. (C) Interpretation of computer data. (D) Manipulation of computer data.

Last Answer : (D) Manipulation of computer data.

Description : There are three c's in computer forensics. Which is one of the three? A. Control B. Chance C. Chains D. Core

Last Answer : A. Control

Description : Digital forensics is all of them except: A. Extraction of computer data. B. Preservation of computer data. C. Interpretation of computer data. D. Manipulation of computer data.

Last Answer : D. Manipulation of computer data.

Description : The most important or powerful computer in a typical network is _____ 1) Desktop 2) Network client 3) Network server 4) Network station 5) None of these

Last Answer : Answer :3

Description : The most important or powerful device in computer in a typical network is: a) desktop b) network client c) network server d) network station e) None of The Above

Last Answer : c) network server

Description : _____ is the most important/powerful computer in a typical network a) Desktop b) Network client c) Network server d) Network station e) None of these

Last Answer : c) Network server

Description : Which of the following statements about the Crime and Criminal Tracking Network System (CCTNS) is/are correct? 1. It will facilitate real time access of classified criminal data to the law enforcement authorities. 2. National Crime ... below- 1) 1 only 2) 2 only 3) Both 1 and 2 4) Neither 1 nor 2

Last Answer : 1) 1 only

Description : In IT, the technique of delaying outgoing acknowledgements temporarily is known as (1) AR Acknowledgement (2) AR request (3) Piggybacking (4) Piggyframing

Last Answer : AR request

Description : A station in a network forwards incoming packets byplacing them on its shortest output queue. Whatrouting algorithm is being used? A. hot potatorouting B. flooding C. static routing D. delta routing E. None of the above

Last Answer : hot potatorouting

Description : Using what, data hiding in encrypted images be carried out in digital forensics? A. Acquisition. B.Steganogrhy. C.Liveanalysis D. Hashing

Last Answer : B.Steganogrhy.

Description : Which of following is a not unethical norm for Digital Forensics Investigation? A. Uphold any relevant evidence. B. Declare any confidential matters or knowledge. C. Distort or falsify education, training, credentials. D. To respect the privacy of others.

Last Answer : D. To respect the privacy of others.

Description : Field of PC forensics began in which year ? a. 1975 b. 1944 c. 1971 d. 1980

Last Answer : d. 1980

Description : How many rules are there in Digital Forensics : a. 5 b. 2 c. 7 d. 6

Last Answer : d. 6

Description : Field of PC forensics began in which year ? a. 1975 b. 1944 c. 1971 d. 1980

Last Answer : d. 1980

Description : . How many rules are there in Digital Forensics : a. 5 b. 2 c. 7 d. 6

Last Answer : d. 6

Description : When cases go to trial, you as a forensics examiner can play one of ____ roles. a. 2 c. 4 b. 3 d.5

Last Answer : a. 2

Description : When was pc forensics began? a. 1980 b. 1984 c. 1995 d. 1997

Last Answer : a. 1980

Description : There are hoe many phases in RMDFR model of digital forensics? a. Four b. Six c. Eight d. Ten

Last Answer : b. Six

Description : Which of the following is not a model of digital forensics? a. RMDFR b. DFI c. IDIP d. UMDFPM

Last Answer : b. DFI

Description : There are how many models of digital forensics? a. 4 b. 5 c. 6 d. 8

Last Answer : c. 6

Description : Fill in the blanks. Digital Forensics is a series of steps to _________ and _________ electronic data through ________ method. a. Solve, analyses, Intelligent b. Uncover, analyses, scientific c. Uncover, analyses, electronic d. Solve, analyses, electronic

Last Answer : b. Uncover, analyses, scientific

Description : How many Rules are there of Digital Forensics? a. 5 b. 6 c. 7 d. 4

Last Answer : b. 6

Description : When cases go to trial forensics examiner can play one of role (a) 2 (b) 4 (c) 3 (d) 5

Last Answer : (b) 4

Description : When the field of PC forensics began? (A) 1960's (B) 1970's (C) 1980's (D) 1990's

Last Answer : (C) 1980's

Description : When the field of PC forensics began? A.1960's B.1970's C.1980's D.1990's

Last Answer : C.1980's

Description : Two or more computers connected to each other of sharing information form a _____ 1) Network 2) Router 3) Server 4) Tunnel 5) Pipeline

Last Answer : Answer :1

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : In a star network each node (file server, workstations and peripherals) is connected to a central device called a _____: a) Bug b) Center c) Hub d) None of These

Last Answer : c) Hub

Description : DNS stands for: a) Domain Network Service b) Domain Necessarily Server c) Domain Name System d) None of These

Last Answer : c) Domain Name System