forked from dvl6072/keys
-
Notifications
You must be signed in to change notification settings - Fork 0
/
FRS
15734 lines (10615 loc) · 330 KB
/
FRS
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1. What is the full form of DFRWS?
(a) Digital Forensic Research Workshop
(b) Digital Forensic Research Workgroup
(c) Digital Forensics and Research Work
(d) none of above
(a) Digital Forensic Research Workshop
2. A network sniffer program is an example of:
(a) Evidence development tool
(b) Packet collection tool
(c) Packet formatting tool
(d) none of the above
(b) Packet collection tool
3. Items included in a forensic toolkit should include the following except
(a) Screwdrivers
(b) Power cables
(c) Printer
(d) Permanent markers
(c) Printer
4. The evidence custodian should
(a) Give the evidence to the secretary
(b) Place evidence in the storage place
(c) Keep logs of who has the evidence, when was it check out, etc.
(d) Use the evidence for personal use.
(c) Keep logs of who has the evidence, when was it check out, etc.
5. ______________ is forensics applied to information stored or transported on
network.
(a) Information forensics
(b) Data forensics
(c) Computer forensics
(d) Network forensics
(d) Network forensics
6. In ____________ intrusion detection system is a device or application used to inspect all network traffic and alert the user or administrator when there has
been unauthorized attempts or access.
(a) Alert data
(b) Security check
(c) Network security
(d) Traffic control
(c) Network security
7. Which phase is not included in generic process model?
(a) Validation and Discrimination
(b) Collection
(c) Analysis
(d) Investigation
(a) Validation and Discrimination
8. What is full form RMW algorithm?
(a) Ready and moonwalk
(b) Ready modify and write
(c) Random moonwalk
(d) none of the above
(c) Random moonwalk
9. CDE refers to
(a) Comprehensive Digital Evidence
(b) Common Digital Evidence
(c) Common Data Entity
(d) none of the above
(a) Comprehensive Digital Evidence
10. MAC refers to
(a) Medium Access Control
(b) Machine Address Control
(c) Machine Assess Control
(d) none of the above
(d) none of the above -> Media access controll address
ForNet can identify network events like ____
(a) ICMP messages
(b) TCP connection establishment, port scanning
(c) UDP connection establishment
(d) Both TCP and UDP
(b) TCP connection establishment, port scanning
PNFEC stands for ____
(a) Portable network forensic evidence collector
(b) Partial network forensic evidence connector
(c) Portable network forensic evidence connector
(d) Partial network forensic evidence collector
(a) Portable network forensic evidence collector
OpenBSD is ____
(a) Operating system
(b) Programming language
(c) Antivirus
(d) Firewall
(a) Operating system
CAIDA stands for ____
(a) Cooperative association for Internet data analysis
(b) Cooperative activity for Internet data analysis
(c) Cooperative association for Internet data assignment
(d) Cooperative activity for Internet data assignment
(a) Cooperative association for Internet data analysis
Network forensic agents are engines of ____
(a) Data gathering
(b) Data analysis
(c) Help in anti-forensics
(d) Attribution
(a) Data gathering
Marking module performs ____
(a) Identification of outgoing packets
(b) Rejection of automatic events
(c) Identification of malicious activity
(d) Analysis of evidence
(c) Identification of malicious activity
7. Bulk_extractor is ____
(a) Forensic tool
(b) Security tool
(c) Antivirus
(d) Firewall
(a) Forensic tool
PNFEC operates in ____
(a) Two modes
(b) Three modes
(c) Four modes
(d) Five modes
(b) Three modes
GHSOM stands for ____
(a) Growing hierarchical self-organizing method
(b) Growing hierarchical self-organizing market
(c) Growing hash value self-organizing map
(d) Growing hierarchical self-organizing map
(d) Growing hierarchical self-organizing map
Forensic mining of network logs are performed ____
(a) Parallel to the system
(b) In real-time case
(c) After attack had launched
(d) Before attack had launched
(c) After attack had launched
The following tool can be used for capturing network packets:
(a) TCPPump
(b) TCPCopy
(c) TCPDump
(d) TCPCap
(c) TCPDump
The following is an application layer protocol
(a) HTTP
(b) SMTP
(c) BOOTP
(d) All of the above
(d) All of the above
Packet capture file format, pcap is based on a library called
(a) libcap
(b) libc
(c) libpcap
(d) libvmi
(c) libpcap
The advanced file format after pcap is
(a) pcapnext
(b) pcapng
(c) pcapnew
(d) None of the above
(b) pcapng
Mandatory blocks in pcapng file format are
(a) SHB and IDB
(b) SHB and EPB
(c) IDB and NRB
(d) SPB and NRB
(a) SHB and IDB
Recent version of NetFlow is
(a) 7
(b) 9
(c) 5
(d) 10
(a) 7
IPFIX stands for
(a) Internal Protocol Flow Information Export
(b) Internet Protocol Flow Information Export
(c) Internet Protocol Flow Intelligent Export
(d) Internet Protocol Flow Information Expert
(b) Internet Protocol Flow Information Export
NetFlow was developed by
(a) Extreme
(b) Juniper
(c) Cisco
(d) Brocade
(c) Cisco
Template records in a NetFlow record can have values between
(a) 0 and 255
(b) 0 and 10
(c) 0 and 1023
(d) 0 and 127
(a) 0 and 255
Optional blocks in pcapng format
(a) EPB
(b) SPB
(c) NRB
(d) All of the above
(d) All of the above
What is the full form of DBSCAN?
(a) Density-based spatial clustering of application with noise
(b) Database spatial clustering of application with noise
(c) Density-based spatial clustering approach with noise
(d) None of the above
(a) Density-based spatial clustering of application with noise
2. SVM is initially designed for
(a) Multi-class problems
(b) One-class problems
(c) Two-class problems
(d) All of the above
(a) Multi-class problems
3. KNN is a ___________ type of learning.
(a) Supervised
(b) Unsupervised
(c) Semi-supervised
(d) None of the above
(a) Supervised
4. Pruning in decision tree is used to avoid __________
(a) Over-fitting
(b) Complexity
(c) Misclassification
(d) None of these
(a) Over-fitting
5. SOM in neural networks stands for
(a) Self-organizing map
(b) Service-oriented model
(c) Self-organizing model
(d) Statistical-oriented map
(a) Self-organizing map
6. SVM is based on the concept of ____________
(a) Lines
(b) Multidimensional planes
(c) Hyperplanes
(d) Curves
(c) Hyperplanes
7. Which of the following is a clustering technique?
(a) SOM
(b) SVM
(c) Naïve Bayes
(d) K-means
(d) K-means
8. SVM refers to
(a) Support vector model
(b) Support vector machines
(c) Support vector methods
(d) Support vector modules
(b) Support vector machines
9. Who is called the father of original genetic algorithm?
(a) John Holland
(b) Vapnik
(c) Charles Dwain
(d) Martin Easter
(a) John Holland
10. DBSCAN algorithm is proposed for ____________ databases.
(a) Multimedia databases
(b) Temporal database
(c) Geographic data
(d) Spatial databases
(d) Spatial databases
1. The phase is not part of the botnet forensic framework.
(a) Investigation
(b) Identification
(c) Analysis
(d) None of the above
(d) None of the above
2. In botnet forensic attribution model cover.
(a) Malware analysis
(b) Attribution
(c) Acquisition
(d) None of the above
(a) Malware analysis
3. Analysis of botnet forensics not covered.
(a) Static analysis
(b) Run time code
(c) Dynamic analysis
(d) None of the above
(c) Dynamic analysis
4. Which of the following is not a part of the botnet life cycle?
(a) Infection
(b) Invocation
(c) Communication
(d) Attack
(b) Invocation
Which of the following statement is incorrect?
(a) IRC-based botnets are prone to detection due to centralized server.
(b) HTTP-based botnets are prone to detection due to centralized server.
(c) P2P-based botnets are prone to detection due to centralized server.
(d) None of the above
(b) HTTP-based botnets are prone to detection due to centralized server.
. Fast-flux mechanism is used by botnets authors for ________
(a) Ensure the availability botnet service
(b) Make the botnets more resilient
(c) Both A and B options
(d) None of the above options
(c) Both A and B options
Which of the following is/are used for data acquisition?
(a) Honeypots
(b) Sandboxes
(c) Both (A) and (B) options
(d) None of these options
Both (A) and (B) options
Which of the following is part of the botnet forensic framework?
(a) Investigation
(b) Identification
(c) Analysis
(d) All of the above
(d) All of the above
The botnet forensic attribution model covers ____________
(a) Malware analysis
(b) Attribution
(c) Acquisition
(d) None of the above
(a) Malware analysis
Analysis of botnet forensics do not cover ___________
(a) Static analysis
(b) Run time code
(c) Dynamic analysis
(d) None of the above
(c) Dynamic analysis
What is the first phase of doing smartphone forensics?
(a) Preservation/Seizing
(b) Acquisition
(c) Analysis
(d) Reports
(a) Preservation/Seizing
2. If we get the device in on-state at crime location, what is the first step we should
perform?
(a) Remove SD card if it is placed in device
(b) Isolate it from network
(c) Switch off the device
(d) None of the above
(b) Isolate it from network
The following is not a smartphone operating system
(a) Symbian
(b) Android
(c) Windows
(d) None of above
(d) None of above
. TCE stands for
(a) Trusted Computing Enterprise
(b) Trusted Communication Environment
(c) Trusted Computing Environment
(d) Tested Computing Environment
(c) Trusted Computing Environment
HDFI stands for
(a) Harmonized Digital Forensic Investigation
(b) Horizontal Digital Forensic Information
(c) Harmonized Defence Forensic Investigation
(d) Harmonized Digital Forensic Interpretation
(a) Harmonized Digital Forensic Investigation
Smartphone forensic investigation must include following steps
(a) Preservation
(b) Data Acquisition
(c) Examination and Analysis
(d) All of the above
(d) All of the above
JTAG stands for
(a) Joint Trust Action Group
(b) Joint Test Action Group
(c) Joint Test Active Group
(d) Joint Test Action Graph
(b) Joint Test Action Group
Only one of the following tools is specific to Smartphone forensics
(a) Encase
(b) Volatality
(c) Oxygen
(d) OWADE
(c) Oxygen
UFED stands for
(a) Universal Forensic Extraction Device
(b) Uniform Forensic Extraction Device
(c) Universal Forensic Examination Device
(d) Universal Forensic Extraction Domain
(a) Universal Forensic Extraction Device
0. Rooting a smartphone involves
(a) Attain privileged access over various subsystems of the OS
(b) Ability to alter or replace system applications or settings
(c) Complete removal of existing version with a more recent version of OS
(d) All of the above
(d) All of the above
CSA stands for ____.
(a) Cloud Security Alliance
(b) Cloud Security Attribution
(c) Cloud Service Alliance
(d) Cloud Sensor Application
(a) Cloud Security Alliance
. A cloud customer uses take services from ____.
(a) Cloud Service Alliance
(b) Software Developers
(c) Software-Defined Networks
(d) Cloud Service Providers
(d) Cloud Service Providers
International Standards ISO 27037 looks for ____.
(a) Creating a common baseline for the practice of digital forensics
(b) Attribution
(c) Attack simulation
(d) Anti-forensics
(a) Creating a common baseline for the practice of digital forensics
Attribution is the procedure of ____.
(a) Deciding and finding the character and cause of digital attack
(b) Acquisition of evidence
(c) Service-level agreement
(d) Software development
(a) Deciding and finding the character and cause of digital attack
VMI collects ____.
(a) High-level information
(b) Software programs
(c) Only logs files
(d) Low-level information
(d) Low-level information
Anti-forensic prevents ____.
(a) Forensic investigation process
(b) Attacker to attack
(c) Security threats
(d) Malicious attacks
(a) Forensic investigation process
7. SLA stands for ____.
(a) Service-level agreement
(b) Security-level alliance
(c) Software-level awareness
(d) Software-level agreement
(a) Service-level agreement
The cloud service models are ____.
(a) SaaS, PaaS, and IaaS
(b) Public and private
(c) Able to perform on-demand services
(d) Cost-effective
(a) SaaS, PaaS, and IaaS
Attribution in a cloud environment is more difficult because ____.
(a) Service-level agreement
(b) Complex architecture of cloud computing
(c) Cloud actors
(d) Cloud consumer
(b) Complex architecture of cloud computing
Multi-jurisdictional and multi-tenant situations are ___.
(a) Analytical issues
(b) Functional issues
(c) Architectural issues
(d) Legal issues
(d) Legal issues
Database/web/email/chat/voice mail servers
Application servers
What is the best statement for taking advantage of a weakness in the security of an IT system?
Exploit
HTTP is_____?
Hypertext Transfer Protocol
Metasploit is____?
Penetration testing software
Contain IP address to MAC address mapping, the time the IP was leased
DHCP Servers
Handles multiplexing of process communication, provides end-to-end reliability, sequencing, flowcontrol, congestion control. Connection established through 3-way handshake.
TCP
Evidence collected from network device logs
Packet analysis
What port isused to connect to the Active Directory in Windows 2000?
389
Monitor network traffic and alerts on suspicious activities
NIDS/NIPS
DDOS attack is______
Many-to-one IP addresses
Rules, Alerts, packet capture is
NIDS/NIPS components
Web server, Email server, network ports canning is
One-to-one IP address
00:03
01:38
Nâng cấp để gỡ bỏ quảng cáo
Chỉ 35,99 US$/năm
Logs successful/failed login attempts for all devices within its authentication system
Authentication Servers
What method can be used in online-password attack?
Dictionary attack - Bruteforce attack
Contains routing tables that map router port swith the network, may function as packet filters
Firewalls
Communicates error messages and other conditions via IP datagrams
Internet Control Message Protocol (ICMP)
Addressing and Routing (src and dst) at Layer 3
Internet Protocol (IP)
Contains tables that store mapping between physical port and MAC addresses
Switches
Devices that pierce the shielding of copper cables
Vampire Taps
Stores web surfing log for an entire organization
Web proxies
MAC flooding (over flowing table) or ARP spoofing (fill table with fake value)
Intercepting traffic from switches
DNS is____
Domain Name Server
Distributed database used to map between domain names and IP addresses
Domain Name System (DNS)
Sensor, collector, aggregator, analysis
Flow record processing system
One source IP, one or more destination IOP, destination port numbers increasing incrementally, large volume of packets, out bound protocol flags set to SYN
TCP port scan
Sniffing, protocol understanding, Alerting and high fidelity
NIDS/NIPS functionality
Recovering and analyzing digital evidence from network resources
Network Forensics
Connection less, unreliable, used by DNS, SNMP, audio/video streaming
User Datagram Protocol
What character can be used t ocomment at the end of your SQL injection?
# -
Pattern matching, parsing fields, packet filtering
Packet analysis techniques
Provides mapping between IP addresses and MAC for a local subnet
Address Resolution Protocol (ARP)
Tool for capturing, filtering, and analyzing traffic
tcpdump
Comprehensive study of protocols, packets and flows, and methods for dissecting them
Packet analysis use cases
Data is broadcasted, easy to eavesdrop
Intercepting traffic from hubs
Libraries: libpcap and WinPcap, Tools: Wireshark, snort, nmap, ngrep, tcpdump
Traffic acquisition software
1.Physical, 2.DataLink, 3.Network, 4.Transport, 5.Session, 6. Presentation, 7.Application
Open System Inter connection (OSI)
Facilitates sending and receiving documents on the web
Hyper Text Transfer Protocol (HTTP)
Understand how a protocol works, how to identify and dissect it; canuse RFCs and standards to understands protocols
Protocol analysis
How do you prevent SQL Injection?
Use Parameterized Queries
May detect attacks in progress, can be tuned to give more granular data
Network Intrusion Detection/Prevention Systems
In default, HTTP services work on port?
80
In default, HTTPS services work on port?
443
Search from common values associated with a protocol, information in encapsulated protocol, port numbers, server functions, common header values
Protocol identification
MAC refers to
Machine Address Control
______________ is forensics applied to information stored or transported on network.
Network forensics
A network sniffer program is an example of:
Packet collection tool
The following is an application layer protocol
All of the above (HTTP, SMTP, BOOTP)
Packet capture file format, pcap is based on a library called
libp cap
Net Flow was developed by
Cisco
Anti-forensic prevents____.
Forensic investigation process
Which of the following type of attack CANNOT be deterred solely through technical means?
Social engineering
HTML is_____?
Hypertext Markup Language
Why do social engineering attacks often succeed?
lack of security awareness
SSL is_____?
Secure Sockets Layer
Which of the following is an example of the theft of network passwords without the use of software tools?
Social engineering
AJAX is?
Asynchronous JavaScript And XML
Which of the following measures can be used to guard against a social engineering attack?
Education, limit available information and security policy.
Which of the following is the major difference between a worm and a Trojan horse?
Worms are self replicating while Trojan horses are not.
What type of program will record system key strokes in a text file and email it to the author, and will also delete system logs every five days or whenever a backup is performed?
Trojan
Which of the following is the boolean operator for logical-and?
&&
In ISO 27002, which sections defines the responses and procedures around a security incident
Information security incident management
Which involves impersonation of users/devices?
Impersonation
In ISO 27002, which sections defines the restriction of access rights to networks, systems, applications, functions and data?
Access control
______________ are the two common data classification schemes
Government and private sector/commercial business
Which attack involves continual requests from a range of remote hosts?
DDoS attack
Which is a hashing function?
MD5
The mark average of Bob and Alice is 70%, Bob and Eve is 60%, and Alice and Eve is 60%. What is Eve's mark?
50%
The mark average of Bob and Alice is 20%, Bob and Eve is 30%, and Alice and Eve is 40%. What is Eve's mark?
50%
Which protocol is not supported by Snort?
IGMP
For an ARP reply, which destination MAC address is used?
The destionation host
What happens to the MD5 signature when a single character is changed in a file?
The whole signature is changed
Layer 4 the transmitted encapsulated data is know as a _____________
segment
Which is the easiest way for an intruder to defeat an IDS?
Compromise the firewall
What does the "SYN", "SYN,ACK", "ACK" sequence signify?
The initial negotiation of a client-server connection
Which commercial business/private sector data classification is used to control information about individuals within an organization?
Private
What hacker does not have many skills, and use standard scripting tools:
Script kiddies
Which involves actual deception of users and system operators?
Mispresentation
Which TCP does MSN Messenger use?
1863
STRIDE is often used in relation to assessing threats against applications or operating systems. _______ is NOT an element of STRIDE
Disclousre
Which Snort command will filter for an incoming FTP response from an FTP server?
alert tcp any 21 -> any any msg "FTP response"
How many characters does a Hex MD5 signature have:
32
How many characters does a Hex SHA-1 signature have:
40
How many bits does an MD5 signature have:
128
How many bits does an SHA-1 signature have:
160
How many bits does an SHA-256 signature have:
160
Which is a valid MD5 Hex signature:
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
Which is an example of a one-way function
MD5 and SHA-1
Which is the following is an example of a MD5 signature:
455D04D3EBDE98FB5AB92B7363DFF33D
What is the Diffie-Hellman method used for:
To pass a secret key
What is MD5 used for:
To create a unique signature
"What happens to the MD5 signature when a single character is changed in a file:"
The signature cannot be produced
What is the main weakness of the Diffie-Hellman method:
It allows for a man-in-the-middle attack
What does the "SYN", "SYN,ACK", "ACK" sequence signify:
The initial negotiation of a client-server connection
"For the ""SYN"", ""SYN,ACK"", ""ACK"" sequence, who generates the initial ""SYN"""
The client
"For the ""SYN"", ""SYN,ACK"", ""ACK"" sequence, who generates the ""SYN,ACK"""
The server
"For the ""SYN"", ""SYN,ACK"", ""ACK"" sequence, who
...
generates the ""ACK"""
The client
Which type of traffic cannot be deeply inspected:
SSH, SFTP, SHTTP
Which TCP port does SMTP use:
25
Which TCP port does IMAP use:
143
Which TCP port does POP-3 use:
110
What is ARP used for:
Discovering the MAC address of a host
For an ARP request, which source MAC address is used
The local host
For an ARP request, which destination MAC address is used
The broadcast address
For an ARP reply which source MAC address is used
The local host
For an ARP reply, which destination MAC address is used
The destination host
Which is the encrypted port used for IMAP over SSL
993
Which tool can determine if a file has been changed