Exam 10: Virtual Machine and Cloud Forensics
Exam 1: Understanding the Digital Forensics Profession and Investigations50 Questions
Exam 2: The Investigators Office and Laboratory50 Questions
Exam 3: Data Acquisition50 Questions
Exam 4: Processing Crime and Incident Scenes50 Questions
Exam 5: Working With Windows and Cli Systems50 Questions
Exam 6: Current Computer Forensics Tools50 Questions
Exam 7: Macintosh and Linux Boot Processes and File Systems48 Questions
Exam 8: Recovering Graphics Files49 Questions
Exam 9: Computer Forensics Analysis and Validation50 Questions
Exam 10: Virtual Machine and Cloud Forensics50 Questions
Exam 11: Live Acquisitions and Network Forensics50 Questions
Exam 12: Email Investigations50 Questions
Exam 13: Cell Phone and Mobile Device Forensics49 Questions
Exam 14: Report Writing for High Tech Investigations50 Questions
Exam 15: Expert Testimony in High Tech Investigations50 Questions
Exam 16: Ethics for the Investigator and Expert Witness50 Questions
Select questions type
What Windows Registry key contains associations for file extensions?
(Multiple Choice)
4.7/5
(36)
The Sysinternals Handle utility shows only file system activity, but does not show what processes are using files on the file system.
(True/False)
4.8/5
(37)
?Match the following terms with the correct definitions below:?
-A computer or network set up to lure an attacker.?
(Multiple Choice)
4.9/5
(36)
__________________ help offset hardware costs for companies and are handy when you want to run legacy or uncommon OSs and software along with the other software on your computer.
(Short Answer)
4.8/5
(33)
The NSA's defense in depth (DiD) strategy contains three modes of protection. Which option below is not one of the three modes?
(Multiple Choice)
5.0/5
(46)
The ________________ software lists all open network sockets, including those hidden by rootkits, and also works on both 32-bit and 64-bit systems.
(Short Answer)
4.9/5
(39)
Select the file below that is used in VirtualBox to create a virtual machine:
(Multiple Choice)
4.8/5
(34)
The __________________ is the version of Pcap available for Linux based operating systems.
(Multiple Choice)
4.9/5
(38)
The Honeynet Project was developed to make information widely available in an attempt to thwart Internet and network attackers.
(True/False)
4.8/5
(46)
?Match the following terms with the correct definitions below:?
-A virtual machine interface that's loaded on top of an existing OS.?
(Multiple Choice)
4.7/5
(35)
What processor instruction set is required in order to utilize virtualization software?
(Multiple Choice)
4.9/5
(33)
The __________ disk image file format is associated with the VirtualBox hypervisor.
(Multiple Choice)
4.8/5
(36)
The capability of type 1 hypervisors is limited only by the amount of available RAM, storage, and throughput.
(True/False)
4.8/5
(36)
In Windows, what PowerShell cmdlet can be used in conjunction with Get-VM to display a virtual machine's network adapters?
(Multiple Choice)
4.9/5
(35)
Select below the program within the PsTools suite that allows you to run processes remotely:
(Multiple Choice)
4.8/5
(40)
The ___________________ is a good tool for extracting information from large Libpcap files; you simply specify the time frame you want to examine.
(Multiple Choice)
4.7/5
(41)
?Match the following terms with the correct definitions below:?
-Computers used without the owners' knowledge in a DDoS attack.?
(Multiple Choice)
4.7/5
(39)
What file type below, associated with VMWare, stores VM paging files that are used as RAM for a virtual machine?
(Multiple Choice)
4.7/5
(39)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)