0
0
Cybersecurityknowledge~5 mins

Network forensics in Cybersecurity - Cheat Sheet & Quick Revision

Choose your learning style9 modes available
Recall & Review
beginner
What is network forensics?
Network forensics is the process of capturing, recording, and analyzing network traffic to find evidence of cyber attacks or unauthorized activity.
Click to reveal answer
beginner
Name two common tools used in network forensics.
Common tools include Wireshark for packet analysis and tcpdump for capturing network traffic.
Click to reveal answer
beginner
Why is capturing network traffic important in network forensics?
Capturing network traffic helps investigators see exactly what data was sent or received, which can reveal attacks or data breaches.
Click to reveal answer
intermediate
What is the difference between network forensics and network monitoring?
Network monitoring watches traffic in real-time to keep systems running smoothly, while network forensics analyzes past traffic to investigate incidents.
Click to reveal answer
beginner
How does network forensics help in cybersecurity?
It helps find how attacks happened, what was affected, and who did it, so organizations can fix problems and prevent future attacks.
Click to reveal answer
What is the main goal of network forensics?
ATo create new network protocols
BTo analyze network traffic for evidence of cyber attacks
CTo block all incoming network traffic
DTo speed up internet connection
Which tool is commonly used to capture and analyze network packets?
APhotoshop
BExcel
CWireshark
DNotepad
Network forensics is mostly used to:
AInvestigate past network incidents
BDesign new websites
CImprove Wi-Fi speed
DEncrypt emails
Which of the following is NOT a purpose of network forensics?
AReal-time network performance monitoring
BAnalyzing malware behavior
CDetecting unauthorized access
DCollecting evidence for legal cases
What kind of data does network forensics analyze?
AHardware specifications
BPrinted documents
CUser passwords only
DNetwork traffic data
Explain what network forensics is and why it is important in cybersecurity.
Think about how looking at past network data can help solve cyber problems.
You got /4 concepts.
    Describe the difference between network monitoring and network forensics.
    Consider when and why each process is used.
    You got /4 concepts.