Unformatted text preview: 19. All of the following would be found in HTTP log files except: a. Size of the requested files. b. Address of the website that the current visitor came from. c. IP address of the visitor. d. Speed of transfer from the previous website. e. None of the above. 20. Which one of the following statements about web logs is true? a. Logs can show unencrypted passwords. b. Logs provide an audit trail of evidence about activities occurring on a website. c. Log entries are so expansive on a busy website that they are virtually impossible to use for forensic purposes. d. Log files are easy for hackers to erase. e. Both a and b. 21. Logs provide which of the following? a. Name of the visitor entering the website. b. Name of the country where the visitor's PC is located. c. The web page the visitor was at before entering the website. d. The route taken over the Internet to arrive at the current website. e. All of the above. 23. After entering an IP address into a traceroute program, how long does it normally take to trace the IP address back to its originating source? a. 1‐2 hours usually. b. 30 minutes on average. c. About 1 minute. d. A few seconds. e. None of the above. 25. In order to avoid working with a money launderer, due diligence in relationship to a new business partner means: a. Becoming familiar with the background of the potential new partner. b. Checking pay stubs of the new partner. c. Reviewing the original copies (not photocopies) of verification documents. d. All of the above. 26. One of the most important legislative acts restricting the activities of money launderers in recent years is the: a. Bank Secrecy Act. Page 42 of 44 ...
View Full Document
- Summer '10
- IP address, 43, passwords. b. Logs, files. b. Address, c. IP address, website. c. Log