Exam 11: Virtual Machines, Network Forensics, and Live Acquisitions
Exam 1: Computer Forensics and Investigations As a Profession50 Questions
Exam 2: Understanding Computer Investigations50 Questions
Exam 3: The Investigators Office and Laboratory50 Questions
Exam 4: Data Acquisition50 Questions
Exam 5: Processing Crime and Incident Scenes50 Questions
Exam 6: Working With Windows and Dos Systems50 Questions
Exam 7: Current Computer Forensics Tools50 Questions
Exam 8: Macintosh and Linux Boot Processes and File Systems50 Questions
Exam 9: Computer Forensics Analysis and Validation50 Questions
Exam 10: Recovering Graphics Files50 Questions
Exam 11: Virtual Machines, Network Forensics, and Live Acquisitions50 Questions
Exam 12: E-Mail Investigations48 Questions
Exam 13: Cell Phone and Mobile Device Forensics37 Questions
Exam 14: Report Writing for High-Tech Investigations48 Questions
Exam 15: Expert Testimony in High-Tech Investigations50 Questions
Exam 16: Ethics for the Expert Witness35 Questions
Select questions type
Helix operates in two modes:Windows Live (GUI or command line) and ____.
Free
(Multiple Choice)
4.8/5
(39)
Correct Answer:
D
A ____ is a computer set up to look like any other machine on your network, but it lures the attacker to it.
Free
(Multiple Choice)
4.8/5
(38)
Correct Answer:
B
Network forensics is a fast, easy process.
Free
(True/False)
4.8/5
(47)
Correct Answer:
False
Match each item with a statement below:
-displays who's logged on locally
(Multiple Choice)
4.9/5
(36)
____ are devices and/or software placed on a network to monitor traffic.
(Multiple Choice)
4.9/5
(25)
The PSTools ____________________ tool allows you to suspend processes.
(Short Answer)
4.9/5
(36)
The term ____________________ means how long a piece of information lasts on a system.
(Short Answer)
4.8/5
(38)
Match each item with a statement below:
-displays the security identifier (SID) of a computer or user
(Multiple Choice)
4.8/5
(36)
Most packet sniffers operate on layer 2 or ____ of the OSI model.
(Multiple Choice)
4.9/5
(35)
The ____ Project was developed to make information widely available in an attempt to thwart Internet and network hackers.
(Multiple Choice)
4.9/5
(35)
Machines used on a DDoS are known as ____ simply because they have unwittingly become part of the attack.
(Multiple Choice)
4.9/5
(31)
Match each item with a statement below:
-a network analysis tool
(Multiple Choice)
4.9/5
(36)
In a(n) ____ attack, the attacker keeps asking your server to establish a connection.
(Multiple Choice)
4.8/5
(35)
____ is a popular network intrusion detection system that performs packet capture and analysis in real time.
(Multiple Choice)
4.8/5
(39)
____ is the U.S. DoD computer forensics lab's version of the dd command that comes with Knoppix-STD.
(Multiple Choice)
5.0/5
(31)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)