Chapter 10 Quiz

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Network forensics is a fast, easy process.

False

When intruders break into a network, they rarely leave a trail behind.

False

__________ hide the most valuable data at the innermost part of the network.

Layered network defense strategies

Virtual machines (VMs) help offset hardware costs for companies.

True

Virtual machines are now common for both personal and business use.

True

________ hypervisors are typically, but not exclusively, loaded on servers or workstations with a lot of RAM and storage.

Type 1

________ is a tool for viewing network traffic graphically.

Etherape

________ can help you determine whether a network is truly under attack or a user has inadvertently installed an untested patch or custom program.

Network forensics

__________ determines how long a piece of information lasts on a system.

Order of volatility

A common way of examining network traffic is by running the ________ program.

tcpdump


Kaugnay na mga set ng pag-aaral

Computer science - Programming languages

View Set

Market Research Exam Chapters: 5,6 & 8

View Set

Economics: Unit 3, Macroeconomics

View Set

Chapter 62: Management of Patients with Cerebrovascular Disorders - PrepU

View Set

Chapter 13- Marketing: Helping Buyers Buy

View Set