Chapter 10 Quiz

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Network forensics is a fast, easy process.

False

When intruders break into a network, they rarely leave a trail behind.

False

__________ hide the most valuable data at the innermost part of the network.

Layered network defense strategies

Virtual machines (VMs) help offset hardware costs for companies.

True

Virtual machines are now common for both personal and business use.

True

________ hypervisors are typically, but not exclusively, loaded on servers or workstations with a lot of RAM and storage.

Type 1

________ is a tool for viewing network traffic graphically.

Etherape

________ can help you determine whether a network is truly under attack or a user has inadvertently installed an untested patch or custom program.

Network forensics

__________ determines how long a piece of information lasts on a system.

Order of volatility

A common way of examining network traffic is by running the ________ program.

tcpdump


Ensembles d'études connexes

FINAL EXAM Pedi 2023/ PrepU CH3

View Set

Unit 9 Chapter 16: Fiscal Policy

View Set

Computer science - Programming languages

View Set

Market Research Exam Chapters: 5,6 & 8

View Set

Economics: Unit 3, Macroeconomics

View Set