To whom is the IP addresses were traced ?
a. Internet Service Provider
b. Cyber Crime Office
c. Only (a)
d. None of the above

1 Answer

Answer :

a. Internet Service Provider

Related questions

Description : The IP address was traced to a cable Internet services provider in city are of a) Hyderabad b) Nagpur c) Aurangabad d) Ahmednagar

Last Answer : a) Hyderabad

Description : _______ is a form of denial of service attack in which a hostile client repeatedly sends SYN packets to every port on the server using fake IP addresses. a) Cybergaming crime b) Memory shaving c) Syn flooding d) Software piracy e) None of these

Last Answer : a) Cybergaming crime

Description : Can e-mail addresses & other personal informations be traced through your IP address?

Last Answer : In most cases, no. You are likely to be using a dynamic IP address that is changing. You could be traced to the owner of the IP block from which it was allocated (almost certainly your ISP ... d have to be doing something seriously bad before anyone would allocate the time and resources to find you.

Description : Cyber trails are advantageous because: A. They are not connected to the physical world. B. Nobody can be harmed by crime on the Internet. C. They are easy to follow. D. Offenders who are unaware of them leave behind more clues than they otherwise would have.

Last Answer : D. Offenders who are unaware of them leave behind more clues than they otherwise would have.

Description : Can my internet posts be traced to my IP address?

Last Answer : It’s certainly possible, but not terribly likely.

Description : Due to the growth of the internet and the predicted depletion of available addresses, a new version of IP version 6 using _____for the address was developed in 1995: a) 128 Bits b) 129 Bits c) 130 Bits d) None of These

Last Answer : a) 128 Bits

Description : Which among the following is correct: a) An IP address can be private - for use on Local Area Network (LAN). b) It can be use on the internet or other wide area network (WAN). c) IP addresses ... dynamically (assigned by another device on the network on demand). d) All of the Above e) None of These

Last Answer : d) All of the Above

Description : Due to the growth of the internet and the predicted depletion of available addresses, a new version of IP version 6 using _____for the address was developed in 1995: a) 128 Bits b) 129 Bits c) 130 Bits d) None of These

Last Answer : a) 128 Bits

Description : Which among the following is correct: a) An IP address can be private - for use on Local Area Network (LAN). b) It can be use on the internet or other wide area network (WAN). c) IP addresses ... dynamically (assigned by another device on the network on demand). d) All of the Above e) None of These

Last Answer : d) All of the Above

Description : Computer crime or Cyber crime is crime that involves: a) Computer b) Network c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Computer crime or Cyber crime is crime that involves: a) Computer b) Network c) Both of Above d) None of These ✐ 386. Net crim

Last Answer : c) Both of Above

Description : Which of the following assertions is FALSE about the Internet Protocol (IP)? a. It is possible for a computer to have multiple IP addresses b. IP packets from the same source to the same ... outgoing packets; the route is determined only by the routing tables in the routers on the way

Last Answer : d. The packet source cannot set the route of an outgoing packets; the route is determined only by the routing tables in the routers on the way

Description : Proxy application gateway (i) acts on behalf of all intranet users wanting to access interne securely (ii)monitors all accesses to internet and allows access to only specified IP addresses (iii) disallows use of certain protocols with ... ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv

Last Answer : b. i, ii, iii 

Description : If, while searching a computer for evidence of a specific crime, evidence of a new, Unrelated crime is discovered, the best course of action is: a. Abandon the original search, and ... a warrant that addresses the new inquiry d. Continue with the original search, ignoring the new information

Last Answer : c. Stop the search and obtain a warrant that addresses the new inquiry

Description : What happens to ip addresses if there are over 4,23 billion internet users.

Last Answer : answer:IPv6 This is planned for. I wouldn’t worry about it.

Description : Which is the protocol that maps varying IP addresses to the Physical MAC Address of a machine in a LAN network? a. ARQ (Automatic Repeat Request) b. ARP (Address Resolution Protocol) c. SLIP (Serial Line Internet Protocol) d. PLIP (Parallel Line Internet Protocol)

Last Answer : b. ARP (Address Resolution Protocol)

Description : Which is the protocol that maps varying IP addresses to the Physical MAC Address of a machine in a LAN network? A. ARQ Automatic Repeat Request B. ARP Address Resolution Protocol C. SLIP Serial Line Internet Protocol D. PLIP Parallel Line Internet Protocol

Last Answer : B. ARP Address Resolution Protocol

Description : ………………….. is responsible for converting the higher level protocol addresses (IP addresses) to physical network addresses. A) Address Resolution Protocol (ARP) B) Reverse Address Resolution Protocol (RARP) C) Bootstrap Protocol (BOOTP) D) Internet Control Message Protocol (ICMP)

Last Answer : A) Address Resolution Protocol (ARP)

Description : A hardened firewall host on an intranet (i) has a proxy application gateway program running on it (ii)Allows specified internet users to access specified services in the intranet (iii) Initiates all internet activities requested by clients ... ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv

Last Answer : c. i, ii, iii, iv 

Description : 8. Nslookup can be used to gather information regarding which of the following? A. Host names and IP addresses B. Whois information C. DNS server locations D. Name server types and operating systems

Last Answer : A. Host names and IP addresses

Description : IP is the full form of a) Internet Provider b) Internet Protocol c) Internet Password d) Do Not Know

Last Answer : b) Internet Protocol

Description : Name the primary law in India dealing with cyber crime and electronic commerce. -Technology

Last Answer : The primary law is Information Technology Act 2000.

Description : What is a computer cyber crime?

Last Answer : Cyber crimes are crimes that are perpetrated with the use of a computer. An example might be where someone uses a pc to illegally obtain someone else's personal information and then the "bad ... information to steal money from the victim. Simply, cyber crime is crime committed using a computer.

Description : What is Cyber Crime ?

Last Answer : According to the encyclopedia, "cyber crime" refers to the crime that is committed using the Internet . It is related to computers and computer networks.

Last Answer : Cyber crime is a computer related crime.

Description : What are two examples of cyber crime stories?

Last Answer : Need answer

Description : ______________is a branch of forensic science encompassing the recovery and investigation of material found in digital devices often in relation to computer crime. a. Analog forensic b. Digital forensic c. Cyber forensic

Last Answer : b. Digital forensic

Description :  ___________is well established science where various contribution have been made A. Forensic B. Crime C. Cyber Crime D. Evidence

Last Answer : A. Forensic 

Description : High levels of demand have decreased the supply of un-allocated internet protocol version 4 addresses available for assignment to internet service providers and end user organization since the _____: a) 1980s b) 1990s c) 2000s d) None of These

Last Answer : a) 1980s

Description : ISP stands for: a) International Service Provider b) Internet Service Provider c) Input Software Protocol d) None of These

Last Answer : b) Internet Service Provider

Description : ISP stands for: a) Internet Speed Provider b) Internet Service Provider c) Internet Security Protocol d) None of These

Last Answer : b) Internet Service Provider

Description : The software that allows users to surf the Internet is called a/an _____: a) Search Engine b) Internet Service Provider c) Multimedia Application d) Browser e) Internet Surfing Provider

Last Answer : d) Browser

Description : Your business has contracted with another company to have them host and run an application for your company over the Internet. The company providing this service to your business is called an a) ... b) Internet access provider c) Application service provider d) Outsource agency e) None of these

Last Answer : d) Outsource agency

Description : Physical security is concerned with protecting computer hardware from human tampering and natural disasters and _____security is concerned with protecting software from unauthorized tampering or damage: a) Data b) Cyber c) Internet d) Meta Physical e) Publicity

Last Answer : b) Cyber

Description : Consider the following statements about Internet facility: 1) It serves as the largest one-line information system. 2) It provides the most dependable and latest mode for sending E-mail. 3) Recurring ... communication E-mail is very high. 4) It is often misused and has triggered cyber-crimes.

Last Answer : 1) It serves as the largest one-line information system

Description : is a branch of Science which deals with the helping machine find solutions to complex problems in a more human like fashion a. Artificial Intelligence b. Internet Od Things c. Embedded system d. cyber Security

Last Answer : a. Artificial Intelligence

Description : is a branch of science which deals with helping machine find solution to complex to problem in a more human like a fashion. (a) Artificial intelligence (b) Internet of think (c) Embided system (d) Cyber security

Last Answer : (a) Artificial intelligence

Description : Synonym of Internet is (1) Gopher (2) Intranet (3) Cyber Space (4) World Wide Web (WWW)

Last Answer :  Cyber Space

Description : Is there a way to identify proxy IP addresses?

Last Answer : Any server can be set up as a proxy server with the right tweaking and tools, and there are a bunch of free ones out there. Just search google for free proxy server . They'll let you browse the web ... the FBI (probably) does it all the time, so it's definitely possible. Sorry I'm not much help!

Description : Is there a way to identify proxy IP addresses?

Last Answer : Any server can be set up as a proxy server with the right tweaking and tools, and there are a bunch of free ones out there. Just search google for free proxy server . They'll let you browse the web ... the FBI (probably) does it all the time, so it's definitely possible. Sorry I'm not much help!

Description : How do I determine which, if any, static IP addresses are being used on my home WiFi network?

Last Answer : Check the status page of your Router setup.

Description : Is it possible to block all traffic on a certain port except to two IP addresses?

Last Answer : It depends upon how flexible your router is. Use the router firmware to set this up. If your firmware isn’t sophisticated enough, try to find something like DWT or another good third-party router firmware program to update the one you have.

Description : Is there a way to block all IP addresses from a certain state from visiting a website?

Last Answer : Um, why? If you don’t mind my asking…

Description : Strange/multiple IP addresses from my iphone. Normal or hacked?

Last Answer : Google has servers all over the place. I don’t think you ever know where communications with them are going to seem like they are coming from.

Description : IP addresses are converted into (a) a binary string (b) alphanumeric string -Technology

Last Answer : (c) DNS translates domain names into their IP addresses and vice-versa.

Description : I found this in the Package Rules menu:

Last Answer : answer:

Description : SHOULD OLD/DORMANT EMAIL ADDRESSES BE DELETED FROMCURRENT IP?

Last Answer : Need Answer

Description : Membership in a VLAN can be based on _________. A) port numbers B) MAC addresses C) IP addresses D) all of theabove

Last Answer : all of theabove

Description : The logicaladdresses in theInternetarecalled _______ addresses. A) port B) IP C) Email D) noneof the above

Last Answer : IP