Module 10 Quiz Flashcards
Which of the following is a clue that a virtual machine has been installed on a host system?
Virtual network adapter
Virtualization software
Network logs
USB drive
Virtual network adapter
A forensic image of a VM includes all snapshots.
True
False
False
A layered network defense strategy puts the most valuable data where?
In the DMZ
In the outermost layer
In the innermost layer
None of the above
In the innermost layer
Packet analyzers examine what layers of the OSI model?
Layers 2 and 3
All layers
Layers 4 through 7
Layers 2 and 4
Layers 2 and 3
Which of the following file extensions are associated with VMware virtual machines?
.vmx, .r0, and .xml-prev
.vdi, .ova, and .r0
.vmx, .log, and .nvram
.vbox, .vdi, and .log
.vmx, .log, and .nvram
In VirtualBox, a(n) __________ file contains settings for virtual hard drives.
.log
.vbox-prev
.ovf
.vbox
.vbox
Which Registry key contains associations for file extensions?
HKEY_CLASSES_FILE
HFILE_CLASSES_ROOT
HFILE_EXTENSIONS
HKEY_CLASSES_ROOT
HKEY_CLASSES_ROOT
The number of VMs that can be supported per host by a type 1 hypervisor is generally determined by the amount of __________ and __________.
Storage, processing power
RAM, network speed
RAM, storage
RAM, GPU
RAM, storage
What are the three modes of protection in the DiD strategy?
People, technology, operations
PCs, mobile devices, laptops
People, PCs, mobile devices
Computer, smartphones, tablets
People, technology, operations
Virtual Machine Extensions (VMX) are part of which of the following?
AMD Virtualized Technology
Type 1 hypervisors
Intel Virtualized Technology
Type 2 hypervisors
Intel Virtualized Technology
Tcpslice can be used to retrieve specific timeframes of packet captures.
True
False
True
You can expect to find a type 2 hypervisor on what type of device?
Tablet
Smartphone
Desktop
All of the above
All of the above
To find network adapters, you use the __________ command in Windows and the __________ command in Linux.
ipconfig, ifconfig
tcpdump, netstat
more, netstat
top, nd
ipconfig, ifconfig
When do zero day attacks occur?
a: On the day the application or OS is released
b: Before a patch is available
c: Before the vendor is aware of the vulnerability
Both b and c.
Both b and c.