Exam 11: Virtual Machines, Network Forensics, and Live Acquisitions

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

____ hide the most valuable data at the innermost part of the network.

(Multiple Choice)
4.7/5
(27)

Match each item with a statement below: -a bootable Linux CD intended for computer and network forensics

(Multiple Choice)
4.7/5
(43)

____ is a Sysinternals command that shows all Registry data in real time on a Windows computer.

(Multiple Choice)
4.8/5
(39)

____ can be used to create a bootable forensic CD and perform a live acquisition.

(Multiple Choice)
4.7/5
(37)

Explain The Auditor tool.

(Essay)
4.9/5
(42)

How should you proceed if your network forensic investigation involves other companies?

(Essay)
4.9/5
(32)

____________________ is a layered network defense strategy developed by the National Security Agency (NSA).

(Short Answer)
4.9/5
(48)

____ is a good tool for extracting information from large Libpcap files.

(Multiple Choice)
4.8/5
(39)

____________________ logs record traffic in and out of a network.

(Short Answer)
4.8/5
(31)

PsList from PsTools allows you to list detailed information about processes.

(True/False)
4.9/5
(38)

The U.K. Honeynet Project has created the ____________________. It contains the honeywall and honeypot on a bootable memory stick.

(Short Answer)
4.9/5
(32)

Match each item with a statement below: -type of malware

(Multiple Choice)
4.7/5
(32)

Match each item with a statement below: -an audit control program that detects anomalies in traffic and sends an alert automatically

(Multiple Choice)
5.0/5
(37)

Most packet sniffer tools can read anything captured in ____ format.

(Multiple Choice)
4.8/5
(43)

____ can help you determine whether a network is truly under attack or a user has inadvertently installed an untested patch or custom program.

(Multiple Choice)
4.8/5
(36)

When intruders break into a network, they rarely leave a trail behind.

(True/False)
4.7/5
(32)

____ is a suite of tools created by Sysinternals.

(Multiple Choice)
4.9/5
(41)

____ is the text version of Ethereal, a packet sniffer tool.

(Multiple Choice)
4.8/5
(28)

The Knoppix STD tool ____ enables you to reset passwords on a Windows computer, including the administrator password

(Multiple Choice)
4.9/5
(32)

Detail a standard procedure for network forensics investigations.

(Essay)
5.0/5
(50)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)