Exam 10: Virtual Machine and Cloud Forensics

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The ___________________ utility can be used to view network traffic graphically.​

(Short Answer)
4.9/5
(37)

Explain the need for using established procedures for acquiring data after an attack or intrusion incident, and list some resources that address these needs.​

(Essay)
5.0/5
(32)

What is a packet analyzer, and how is it used?​

(Essay)
4.8/5
(38)

?Match the following terms with the correct definitions below:? -?Intrusion prevention and monitoring systems that track what attackers do on honeypots.

(Multiple Choice)
4.9/5
(34)

?Match the following terms with the correct definitions below:? -?A virtual machine interface that loads on physical hardware and contains its own OS.

(Multiple Choice)
4.9/5
(37)

?The _______________ command line program is a common way of examining network traffic, which provides records of network activity while it is running, and produce hundreds or thousands of records.

(Multiple Choice)
4.9/5
(31)

What is a VM snapshot, and why is a live acquisition typically required for VMs?​

(Essay)
4.9/5
(32)

Updating security patches, antivirus software, and OSs fall into the ________________ category of the defense in depth strategy.​

(Short Answer)
4.8/5
(38)

?Match the following terms with the correct definitions below:? -?A type of DoS attack in which other online machines are used, without the owner's knowledge, to launch an attack.

(Multiple Choice)
4.8/5
(39)

?Match the following terms with the correct definitions below:? -An approach to network hardening that sets up several network layers to place the most valuable data at the innermost part of the network?

(Multiple Choice)
4.9/5
(36)
Showing 41 - 50 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)