Digital forensics chapter 10

Ace your homework & exams now with Quizwiz!

The Honeynet Project was developed to make information widely available in an attempt to thwart Internet and network attackers. True False

True

The capability of type 1 hypervisors is limited only by the amount of available RAM, storage, and throughput. True False

True

The SANS Investigative Forensics Toolkit (SIFT) appliance can currently only be installed on what version of Ubuntu? a. 12.04 b. 13.11 c. 14.04 d. 14.11

a. 12.04

Select below the option that is not a common type 1 hypervisor: a. VM vSphere b. Microsoft Hyper-V c. Citrix XenServer d. Oracle VirtualBox

a. VMware vSphere

What Windows Registry key contains associations for file extensions? a. hkey_classes_root b. hkey_users c. hkey_local_machine d. hkey_current_config

a. hkey_classes_root

What file type below, associated with VMWare, stores VM paging files that are used as RAM for a virtual machine? a. .nvram b. .vmem c. .vmpage d. .vmx

b. .vmem

The __________ is the version of Pcap available for Linux based operating systems. a. Wincap b. Libpcap c. Tcpcap d. Netcap

b. Libpcap

In VirtualBox, _________ different types of virtual network adapters are possible, such as AMD and Intel Pro adapters. a. 2 b. 4 c. 6 d. 8

c. 6

In Windows, what PowerShell cmdlet can be used in conjunction with Get-VM to display a virtual machine's network adapters? a. Show-NetworkAdapters b. Query-ipconfig c. Get-VMNetworkAdapter d. Dump-Netconfig

c. Get-VMNetworkAdapter

What utility is best suited to examine e-mail headers or chat logs, or network communication between worms and viruses? a. tcpdump b. argus c. Ngrep d. Tcpsplice

c. Ngrep

What processor instruction set is required in order to utilize virtualization software? a. AMD-VT b. Intel VirtualBit c. Virtual Machine Extension (VMX) d. Virtual Hardware Extensions (VHX)

c. Virtual Machine Extensions (VMX)

Select the file below that is used in VirtualBox to create a virtual machine: a. .vdi b. .vbox c. .r0 d. .ova

d. .ova

The NSA's defense in depth (DiD) strategy contains three modes of protection. Which option below is not one of the three modes? a. People b. Technology c. Operations d. Management

d. Management

The Sysinternals Handle utility shows only file systems activity, but does not show what processes are using files on the file system. True False

False

Type 2 hypervisors are typically loaded on servers or workstations with a lot of RAM and storage. True False

False


Related study sets

Świat po II wojnie światowej - Historia. Po prostu (pytania do działu IX)

View Set

Chapter 48 Neurobiology of Psychotic Illnesses

View Set

Graphs of Tangent, Cotangent, Secant, and Cosecant

View Set