Exam 11: Virtual Machines, Network Forensics, and Live Acquisitions
Exam 1: Computer Forensics and Investigations As a Profession50 Questions
Exam 2: Understanding Computer Investigations50 Questions
Exam 3: The Investigators Office and Laboratory50 Questions
Exam 4: Data Acquisition50 Questions
Exam 5: Processing Crime and Incident Scenes50 Questions
Exam 6: Working With Windows and Dos Systems50 Questions
Exam 7: Current Computer Forensics Tools50 Questions
Exam 8: Macintosh and Linux Boot Processes and File Systems50 Questions
Exam 9: Computer Forensics Analysis and Validation50 Questions
Exam 10: Recovering Graphics Files50 Questions
Exam 11: Virtual Machines, Network Forensics, and Live Acquisitions50 Questions
Exam 12: E-Mail Investigations48 Questions
Exam 13: Cell Phone and Mobile Device Forensics37 Questions
Exam 14: Report Writing for High-Tech Investigations48 Questions
Exam 15: Expert Testimony in High-Tech Investigations50 Questions
Exam 16: Ethics for the Expert Witness35 Questions
Select questions type
____ hide the most valuable data at the innermost part of the network.
(Multiple Choice)
4.7/5
(27)
Match each item with a statement below:
-a bootable Linux CD intended for computer and network forensics
(Multiple Choice)
4.7/5
(43)
____ is a Sysinternals command that shows all Registry data in real time on a Windows computer.
(Multiple Choice)
4.8/5
(39)
____ can be used to create a bootable forensic CD and perform a live acquisition.
(Multiple Choice)
4.7/5
(37)
How should you proceed if your network forensic investigation involves other companies?
(Essay)
4.9/5
(32)
____________________ is a layered network defense strategy developed by the National Security Agency (NSA).
(Short Answer)
4.9/5
(48)
____ is a good tool for extracting information from large Libpcap files.
(Multiple Choice)
4.8/5
(39)
____________________ logs record traffic in and out of a network.
(Short Answer)
4.8/5
(31)
PsList from PsTools allows you to list detailed information about processes.
(True/False)
4.9/5
(38)
The U.K. Honeynet Project has created the ____________________. It contains the honeywall and honeypot on a bootable memory stick.
(Short Answer)
4.9/5
(32)
Match each item with a statement below:
-an audit control program that detects anomalies in traffic and sends an alert automatically
(Multiple Choice)
5.0/5
(37)
Most packet sniffer tools can read anything captured in ____ format.
(Multiple Choice)
4.8/5
(43)
____ can help you determine whether a network is truly under attack or a user has inadvertently installed an untested patch or custom program.
(Multiple Choice)
4.8/5
(36)
When intruders break into a network, they rarely leave a trail behind.
(True/False)
4.7/5
(32)
____ is the text version of Ethereal, a packet sniffer tool.
(Multiple Choice)
4.8/5
(28)
The Knoppix STD tool ____ enables you to reset passwords on a Windows computer, including the administrator password
(Multiple Choice)
4.9/5
(32)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)