Virtual Machine Forensics, Live Acquisitions, and Network Forensics Flashcards

(39 cards)

1
Q

Type 2 hypervisors cannot be used on laptops

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which tool lists all open network sockets, including those hidden by rootkits?

A

Memoryze

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Network logs record traffic in and out of a network

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Virtual machines (VMs) help offset hardware costs for companies

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When intruders break into a network, they rarely leave a trail behind

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In network forensics, you have to restore the drive to see how malware that attackers have installed on the system works

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which project was developed to make information widely available in an attempt to thwart Internet and network hackers?

A

Honeynet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which product responded to the need for security and performance by producing different CPU designs?

A

Virtualization Technology (VT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which type of forensics can help you determine whether a system is truly under attack or a user has inadvertently installed an untested patch or custom program?

A

Network Forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which network protocol analyzer can be programmed to examine TCP headers to find the SYN flag?

A

Tethereal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

On which OSI model layers do most packet analyzers operate?

A

Layers 2 and 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which network defense strategy, developed by the National Security Agency (NSA), has three modes of protection?

A

Defense in Depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In which type of attack does the attacker keep asking the server to establish a connection?

A

SYN flood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Before attempting to install a type 2 hypervisor, you need to enable virtualization in the BIOS before attempting to create a VM

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which format can be read by most packet analyzer tools?

A

Pcap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which tool was designed as an easy-to-use interface for inspecting and analyzing large tcpdump files?

17
Q

Virtual machines are now common for both personal and business use

18
Q

What term is used for the machines used in a DDoS attack?

19
Q

Which tool is useful for extracting information from large Libpcap files?

20
Q

What type of software runs virtual machines?

21
Q

What determines how long a piece of information lasts on a system?

A

Order of volatility

22
Q

A honeywall is a computer set up to look like any other machine on your network, but it lures the attack to it

23
Q

Type 1 hypervisors are usually the ones you find loaded on a suspect machine

24
Q

Which tool allows network traffic to be viewed graphically

25
Which type of virtual machine software is typically, but not exclusively, loaded on servers or workstations with a lot of RAM and storage?
Type 1
26
A forensic image of a VM includes all snapshots
False
27
To find network adapters, you use ____________ command in Windows and the ____________ command in Linux
ipconfig, ifconfig
28
A layered network defense strategy puts the most valuable data where?
In the innermost layer
29
Packet analyzers examine what layers of the OSI model?
Layer 2 and 3
30
Which of the following file extensions are associated with VMware virtual machines?
.vmx, .log, and .nvram
31
In VirtualBox, a(n) ________ file contains settings for virtual hard drives
.vbox
32
Which Registry key contains associations for file extensions?
HKEY_CLASSES_ROOT
33
The number of VMs that can be supported per host by a type 1 hypervisor is generally determined by the amount of _____________ and ____________.
RAM, storage
34
When do zero day attacks occur?
On the day the application or OS is released, before the vendor is aware of the vulnerability
35
You can expect to find a type 2 hypervisor on what type of device?
Desktop, Smartphone, Tablet
36
Which of the following is a clue that a virtual machine has been installed on a host system?
Virtual network adapter
37
Virtual Machine Extensions (VMX) are part of which of the following?
Intel Virtualized Technology
38
What are the three modes of protection in the DiD strategy?
People, Technology, Operations
39
Tcpslice can be used to retrieve specific timeframes of packet captures
True