Chapter 10 Quiz

Ace your homework & exams now with Quizwiz!

Network forensics is a fast, easy process.

False

When intruders break into a network, they rarely leave a trail behind.

False

__________ hide the most valuable data at the innermost part of the network.

Layered network defense strategies

Virtual machines (VMs) help offset hardware costs for companies.

True

Virtual machines are now common for both personal and business use.

True

________ hypervisors are typically, but not exclusively, loaded on servers or workstations with a lot of RAM and storage.

Type 1

________ is a tool for viewing network traffic graphically.

Etherape

________ can help you determine whether a network is truly under attack or a user has inadvertently installed an untested patch or custom program.

Network forensics

__________ determines how long a piece of information lasts on a system.

Order of volatility

A common way of examining network traffic is by running the ________ program.

tcpdump


Related study sets

FINAL EXAM Pedi 2023/ PrepU CH3

View Set

Unit 9 Chapter 16: Fiscal Policy

View Set

Computer science - Programming languages

View Set

Market Research Exam Chapters: 5,6 & 8

View Set

Economics: Unit 3, Macroeconomics

View Set