Chapter 10 Quiz
Network forensics is a fast, easy process.
False
When intruders break into a network, they rarely leave a trail behind.
False
__________ hide the most valuable data at the innermost part of the network.
Layered network defense strategies
Virtual machines (VMs) help offset hardware costs for companies.
True
Virtual machines are now common for both personal and business use.
True
________ hypervisors are typically, but not exclusively, loaded on servers or workstations with a lot of RAM and storage.
Type 1
________ is a tool for viewing network traffic graphically.
Etherape
________ can help you determine whether a network is truly under attack or a user has inadvertently installed an untested patch or custom program.
Network forensics
__________ determines how long a piece of information lasts on a system.
Order of volatility
A common way of examining network traffic is by running the ________ program.
tcpdump