Technology Flashcards

1
Q

List at least 6 of the protocols found in the application layer of the Internet protocol suite

A

HTTP, HTTPS, SMTP, POP, DNS, IMAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Who is Tim Berners-Lee? What does HTTP stand for? Name a web server technology? Name a web client? What does URL stand for?

A

a. Berners-Lee invented the world wide web
b. HTTP (hyper text transfer protocol)
c. Web server technology –
d. Web client –
e. URL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is HTTP protocol

A

(hyper text transfer protocol): operates between web server and client for internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is FTP protocol

A

(file transfer protocol): used to transfer large files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is SMTP protocol

A

(simple mail transfer protocol): email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is POP protocol

A

email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is IRC protocol

A

internet relay chat - used to transfer files directly, most oftenly used by offenders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is NNTP protocol

A

Network News Transfer Protocol, is a protocol used primarily for reading and posting articles on Usenet discussion groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is TCP protocol

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is NTP protocol

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

List the regional registries that control IP allocation around the world

A

www.arin.net
www.ripe.net
www.afrinic.net
www.apnic.net
www.lacnic.net

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the difference between a ccTLD and a gTLD

A

ccTLD (country code top level domain) - .ie, .uk, .fi

gTLD (global top level domain) - .com, .org

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the difference between a Registrant, Registry and a Registrar

A

a. Registrant –
b. Registry – .net (verisign), .info (Afilias),
c. Registrar – Godaddy, blacknight”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Outline the purposes and functionality of the DNS system

A

Domain Name system. Converts IP addresses (numbers) of web addresses to plain text URLs, which are much easier to remember. Domain names are unique

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is WHOIS information and where can you get it for the gTLD space

A

Find owner/registrant of domain/website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does the expression Root Server mean in relation to DNS and what role does it play in the DNS system

A

Root servers are the address books of the internet and store the conversion between IP addresses and plain text URLs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What makes Peer to Peer file sharing popular with open traders of child exploitation material

A

Direct connection, encrypted

18
Q

List the difference between Image Chans and Forums

A

“Image chans have minimalistic structures, often without user accounts or profiles. Users usually post anonymously

Forums often require user registration and have more complex structures with user profiles, signatures, and sometimes a ranking or reputation system.
Discussions are typically text-based, organized into categories and sub-forums”

19
Q

Outline two of reasons that email is used by online sex offenders with examples

A

Mailboxes are not public, data is indexable / searchable easily accessible data
Use email to be contacted / contact others
Continue conversation from forums on email”

20
Q

What is an anonymous remailer and how does it work?

A

Strip away email headers, encrypt data with public key, no identifiers on where email originated from

21
Q

As a collector of CAM why should I use online mail

A

“a. Does not store data locally like a mail client out. Using a web interface doesn’t display / download data
b. Does not store data locally to machine, stored in cloud
c. Online storage that in indexable”

22
Q

Compare and contrast the use of a mail client and mail download with local storage and online webmail

A

“a. Store data online not stored locally on machine, accessible all over with internet connection
b. Local storage – easily accessible offline / indexable, no internet connection required
c. Storage and ease of access”

23
Q

List 5 of the “Big 7” top level UseNet hierarchies

A

“comp: This hierarchy contains groups related to computers and technology. Topics can range from software to hardware, programming languages, and networking.
sci: This hierarchy includes groups that discuss science-related topics. This could involve physics, biology, chemistry, and other scientific disciplines.
soc: The soc hierarchy focuses on social issues and cultural discussions. It includes groups for discussing different societies, social norms, and cultural practices.
rec: Recreational activities are the focus of this hierarchy. It includes groups for hobbies, sports, music, games, and a variety of other leisure activities.
news: This hierarchy is meta-discussive, focusing on issues related to the Usenet system itself, including discussions about the Usenet, its administration, and its support.
talk, which is known for more contentious or controversial topics,
misc, which includes discussions that do not necessarily fit into the other more defined categories”You find 100 Nzb files on a suspects computer, what can you conclude

24
Q

You find 100 Nzb files on a suspects computer, what can you conclude

A

NZB file is a file format used primarily within the Usenet community. It was created to simplify the process of downloading files from Usenet newsgroups

25
Q

Briefly describe the dark net and describe how they are used to propagate Child Sexual Abuse Material:

A

The dark net is a small portion of the deep web that has been intentionally hidden and is inaccessible through standard web browsers. Accessing the dark net requires specific software, configurations, or authorization, most commonly using tools like Tor or I2P.

26
Q

Briefly describe the deep web and describe how they are used to propagate Child Sexual Abuse Material:

A

“The deep web refers to all the parts of the internet that are not indexed by standard search engines like Google, Bing, or Yahoo. This includes any pages that are behind paywalls, require sign-in credentials, or are dynamically generated and thus not searchable or visible to the public.
Content Examples: Private databases, membership websites, confidential corporate web pages, and personal email accounts.”

27
Q

Briefly describe the usenet and describe how they are used to propagate Child Sexual Abuse Material:

A

Usenet is an older distributed discussion system separate from the World Wide Web, established in 1980. It allows users to read and post messages to various newsgroups. While originally designed for textual messages and discussions, it is now also used for sharing binaries (files) across its system.

28
Q

Why is IRC a perfect combination of functionality for online child sex offenders

A

Direct client to client connection

29
Q

What does the @ sign signify within an IRC room

A

“a. @ - Username of person in charge of room
b. + - higher status”

30
Q

What other parameters would you need with the /j command executed in the status window

A

the /j command is a shorthand or abbreviation for the /join command, which is used to join a specific channel

31
Q

What does DCC mean?

A

Direct client to client communication, Don’t need to connect to IRC server to share files

32
Q

Is mIRC a client or a server?

A

client

33
Q

Describe the “cuckoo carousel” as described in the lecture on web based CAM sharing

A

taking resources of someone else to achieve your goals

34
Q

What do you understand by the term EXIF data? List five elements of EXIF data that have investigative value

A

EXIF (Exchangeable Image File Format) data is metadata embedded within image files captured by digital cameras and smartphones.

Date and Time of Capture
GPS Coordinates
Camera Model and Settings
Software and Editing History
Thumbnail images and Comments

35
Q

Which image file formats would you expect to support animation and transparency

A

GIF

36
Q

What would you expect to find if you saw the following headers: ÿØÿà

A

JPEG

37
Q

Describe the following file types: TIFF

A
38
Q

Describe the following file types: RAW

A
39
Q

Describe the following file types: GIF

A
40
Q

Describe the following file types: BMP

A
41
Q

Describe the following file types: PNG

A
42
Q
A