Digital Forensics: Network Threats and Network Attacks
Published:
Questions
30
Duration
30 min
Faculty-reviewed
0
Updated
20 May 2026
Practice with national-level exam (FACT, FACT Plus, NET, CUET, etc.) mocks, learn from structured notes, and get your doubts solved in one place.
Published:
Questions
30
Duration
30 min
Faculty-reviewed
0
Updated
20 May 2026
Score, per-question explanations and topic breakdown shown right after you submit.
Free ForensicSpot account required to save your progress — you’ll sign in when you start.
This FACT-aligned mock practice test covers the network-attack section of the digital forensics paper in thirty timed questions. The set runs across the wire from passive eavesdropping in promiscuous mode through Wireshark and tcpdump captures, ARP cache poisoning under RFC 826, DNS cache poisoning and the DNSSEC mitigation from RFC 4033, IP source-address forgery and BCP 38 ingress filtering from RFC 2827, BGP prefix hijacking with the 2010 China Telecom incident as the worked example, MAC spoofing on Linux through the ip link command and macchanger, web-jacking through DNS hijack and certificate compromise, and the OWASP Top 10 (2021) ordering with Broken Access Control at the top.
Wireless coverage spans WEP IV-reuse and RC4 keystream attacks through aircrack-ng, the WPA2 four-way handshake capture used for offline dictionary attacks, the 2017 KRACK paper by Vanhoef and Piessens, WPA3 with the SAE Dragonfly handshake, evil twin rogue access points, and 802.11 deauthentication frame spoofing fixed by 802.11w. Denial-of-service coverage runs from SYN flood and UDP flood through DNS amplification reflection. Application-layer coverage closes with SSL stripping from Moxie Marlinspike sslstrip and the HSTS mitigation in RFC 6797, plus authentication factors, IEEE 802.1X with EAP and EAPOL, zero-day terminology, wireless rogue-AP detection, typosquatting, and the named subtypes of social engineering. The mock complements the cyber-crime mock by focusing on what a network forensicator sees on the wire rather than the legal category of the offence.
The set suits MSc and BSc forensic-science students preparing for the FACT entrance, NFSU MSc digital forensics entrance, and CCFP, GCIH, and CHFI question banks. It also works for VAPT and information-security audit aspirants who want a refresher on the L2-to-L7 attack surface in one sitting.
Topics covered:
Time the attempt to mirror exam conditions. Allow 30 minutes.
Questions are written and edited by the ForensicSpot team and cited from peer-reviewed forensic textbooks, official syllabi and primary case law. Each one is verified before publishing. Detailed explanations show after you submit, so the test stays a real test. See a mistake? Tell us.