Module 10 Quiz Flashcards

1
Q

Which of the following is a clue that a virtual machine has been installed on a host system?

Virtual network adapter

Virtualization software

Network logs

USB drive

A

Virtual network adapter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A forensic image of a VM includes all snapshots.

True

False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A layered network defense strategy puts the most valuable data where?

In the DMZ

In the outermost layer

In the innermost layer

None of the above

A

In the innermost layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Packet analyzers examine what layers of the OSI model?

Layers 2 and 3

All layers

Layers 4 through 7

Layers 2 and 4

A

Layers 2 and 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following file extensions are associated with VMware virtual machines?

.vmx, .r0, and .xml-prev

.vdi, .ova, and .r0

.vmx, .log, and .nvram

.vbox, .vdi, and .log

A

.vmx, .log, and .nvram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In VirtualBox, a(n) __________ file contains settings for virtual hard drives.

.log

.vbox-prev

.ovf

.vbox

A

.vbox

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which Registry key contains associations for file extensions?

HKEY_CLASSES_FILE

HFILE_CLASSES_ROOT

HFILE_EXTENSIONS

HKEY_CLASSES_ROOT

A

HKEY_CLASSES_ROOT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The number of VMs that can be supported per host by a type 1 hypervisor is generally determined by the amount of __________ and __________.

Storage, processing power

RAM, network speed

RAM, storage

RAM, GPU

A

RAM, storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the three modes of protection in the DiD strategy?

People, technology, operations

PCs, mobile devices, laptops

People, PCs, mobile devices

Computer, smartphones, tablets

A

People, technology, operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Virtual Machine Extensions (VMX) are part of which of the following?

AMD Virtualized Technology

Type 1 hypervisors

Intel Virtualized Technology

Type 2 hypervisors

A

Intel Virtualized Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Tcpslice can be used to retrieve specific timeframes of packet captures.

True

False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You can expect to find a type 2 hypervisor on what type of device?

Tablet

Smartphone

Desktop

All of the above

A

All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

To find network adapters, you use the __________ command in Windows and the __________ command in Linux.

ipconfig, ifconfig

tcpdump, netstat

more, netstat

top, nd

A

ipconfig, ifconfig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When do zero day attacks occur?

a: On the day the application or OS is released

b: Before a patch is available

c: Before the vendor is aware of the vulnerability

Both b and c.

A

Both b and c.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly