Exam 11: Virtual Machines, Network Forensics, and Live Acquisitions

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Helix operates in two modes:Windows Live (GUI or command line) and ____.

Free
(Multiple Choice)
4.8/5
(39)
Correct Answer:
Verified

D

A ____ is a computer set up to look like any other machine on your network, but it lures the attacker to it.

Free
(Multiple Choice)
4.8/5
(38)
Correct Answer:
Verified

B

Network forensics is a fast, easy process.

Free
(True/False)
4.8/5
(47)
Correct Answer:
Verified

False

Match each item with a statement below: -displays who's logged on locally

(Multiple Choice)
4.9/5
(36)

What is Knoppix-STD?

(Essay)
4.7/5
(42)

____ are devices and/or software placed on a network to monitor traffic.

(Multiple Choice)
4.9/5
(25)

The PSTools ____________________ tool allows you to suspend processes.

(Short Answer)
4.9/5
(36)

The term ____________________ means how long a piece of information lasts on a system.

(Short Answer)
4.8/5
(38)

Match each item with a statement below: -displays the security identifier (SID) of a computer or user

(Multiple Choice)
4.8/5
(36)

Most packet sniffers operate on layer 2 or ____ of the OSI model.

(Multiple Choice)
4.9/5
(35)

The ____ Project was developed to make information widely available in an attempt to thwart Internet and network hackers.

(Multiple Choice)
4.9/5
(35)

Machines used on a DDoS are known as ____ simply because they have unwittingly become part of the attack.

(Multiple Choice)
4.9/5
(31)

Why is testing networks as important as testing servers?

(Essay)
4.8/5
(37)

Describe some of the Windows tools available at Sysinternals.

(Essay)
4.8/5
(38)

Match each item with a statement below: -a network analysis tool

(Multiple Choice)
4.9/5
(36)

In a(n) ____ attack, the attacker keeps asking your server to establish a connection.

(Multiple Choice)
4.8/5
(35)

The PSTools ____ kills processes by name or process ID.

(Multiple Choice)
4.8/5
(39)

What is the general procedure for a live acquisition?

(Essay)
4.9/5
(40)

____ is a popular network intrusion detection system that performs packet capture and analysis in real time.

(Multiple Choice)
4.8/5
(39)

____ is the U.S. DoD computer forensics lab's version of the dd command that comes with Knoppix-STD.

(Multiple Choice)
5.0/5
(31)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)