Virtual Machine Forensics, Live Acquisitions, and Network Forensics Flashcards
Type 2 hypervisors cannot be used on laptops
False
Which tool lists all open network sockets, including those hidden by rootkits?
Memoryze
Network logs record traffic in and out of a network
True
Virtual machines (VMs) help offset hardware costs for companies
True
When intruders break into a network, they rarely leave a trail behind
False
In network forensics, you have to restore the drive to see how malware that attackers have installed on the system works
True
Which project was developed to make information widely available in an attempt to thwart Internet and network hackers?
Honeynet
Which product responded to the need for security and performance by producing different CPU designs?
Virtualization Technology (VT)
Which type of forensics can help you determine whether a system is truly under attack or a user has inadvertently installed an untested patch or custom program?
Network Forensics
Which network protocol analyzer can be programmed to examine TCP headers to find the SYN flag?
Tethereal
On which OSI model layers do most packet analyzers operate?
Layers 2 and 3
Which network defense strategy, developed by the National Security Agency (NSA), has three modes of protection?
Defense in Depth
In which type of attack does the attacker keep asking the server to establish a connection?
SYN flood
Before attempting to install a type 2 hypervisor, you need to enable virtualization in the BIOS before attempting to create a VM
True
Which format can be read by most packet analyzer tools?
Pcap