Exam 10: Virtual Machine and Cloud Forensics

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What Windows Registry key contains associations for file extensions?​

(Multiple Choice)
4.7/5
(36)

The Sysinternals Handle utility shows only file system activity, but does not show what processes are using files on the file system.

(True/False)
4.8/5
(37)

?Match the following terms with the correct definitions below:? -A computer or network set up to lure an attacker.?

(Multiple Choice)
4.9/5
(36)

__________________ help offset hardware costs for companies and are handy when you want to run legacy or uncommon OSs and software along with the other software on your computer.​

(Short Answer)
4.8/5
(33)

The NSA's defense in depth (DiD) strategy contains three modes of protection. Which option below is not one of the three modes?​

(Multiple Choice)
5.0/5
(46)

The ________________ software lists all open network sockets, including those hidden by rootkits, and also works on both 32-bit and 64-bit systems.​

(Short Answer)
4.9/5
(39)

Select the file below that is used in VirtualBox to create a virtual machine:​

(Multiple Choice)
4.8/5
(34)

The __________________ is the version of Pcap available for Linux based operating systems.​

(Multiple Choice)
4.9/5
(38)

The Honeynet Project was developed to make information widely available in an attempt to thwart Internet and network attackers.​

(True/False)
4.8/5
(46)

Describe a zero day attack.​

(Essay)
4.7/5
(35)

?Match the following terms with the correct definitions below:? -A virtual machine interface that's loaded on top of an existing OS.?

(Multiple Choice)
4.7/5
(35)

What processor instruction set is required in order to utilize virtualization software?​

(Multiple Choice)
4.9/5
(33)

The __________ disk image file format is associated with the VirtualBox hypervisor.​

(Multiple Choice)
4.8/5
(36)

Forensics tools can't directly mount VMs as external drives.​

(True/False)
4.8/5
(33)

The capability of type 1 hypervisors is limited only by the amount of available RAM, storage, and throughput.​

(True/False)
4.8/5
(36)

In Windows, what PowerShell cmdlet can be used in conjunction with Get-VM​ to display a virtual machine's network adapters?

(Multiple Choice)
4.9/5
(35)

Select below the program within the PsTools suite that allows you to run processes remotely:​

(Multiple Choice)
4.8/5
(40)

The ___________________ is a good tool for extracting information from large Libpcap files; you simply specify the time frame you want to examine.

(Multiple Choice)
4.7/5
(41)

?Match the following terms with the correct definitions below:? -Computers used without the owners' knowledge in a DDoS attack.?

(Multiple Choice)
4.7/5
(39)

What file type below, associated with VMWare, stores VM paging files that are used as RAM for a virtual machine?​

(Multiple Choice)
4.7/5
(39)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)