Virtual Machine Forensics, Live Acquisitions, and Network Forensics Flashcards

1
Q

Type 2 hypervisors cannot be used on laptops

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which tool lists all open network sockets, including those hidden by rootkits?

A

Memoryze

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Network logs record traffic in and out of a network

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Virtual machines (VMs) help offset hardware costs for companies

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When intruders break into a network, they rarely leave a trail behind

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In network forensics, you have to restore the drive to see how malware that attackers have installed on the system works

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which project was developed to make information widely available in an attempt to thwart Internet and network hackers?

A

Honeynet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which product responded to the need for security and performance by producing different CPU designs?

A

Virtualization Technology (VT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which type of forensics can help you determine whether a system is truly under attack or a user has inadvertently installed an untested patch or custom program?

A

Network Forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which network protocol analyzer can be programmed to examine TCP headers to find the SYN flag?

A

Tethereal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

On which OSI model layers do most packet analyzers operate?

A

Layers 2 and 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which network defense strategy, developed by the National Security Agency (NSA), has three modes of protection?

A

Defense in Depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In which type of attack does the attacker keep asking the server to establish a connection?

A

SYN flood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Before attempting to install a type 2 hypervisor, you need to enable virtualization in the BIOS before attempting to create a VM

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which format can be read by most packet analyzer tools?

A

Pcap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which tool was designed as an easy-to-use interface for inspecting and analyzing large tcpdump files?

A

Netdude

17
Q

Virtual machines are now common for both personal and business use

A

True

18
Q

What term is used for the machines used in a DDoS attack?

A

Zombies

19
Q

Which tool is useful for extracting information from large Libpcap files?

A

Tcpslice

20
Q

What type of software runs virtual machines?

A

A Hypervisor

21
Q

What determines how long a piece of information lasts on a system?

A

Order of volatility

22
Q

A honeywall is a computer set up to look like any other machine on your network, but it lures the attack to it

A

False

23
Q

Type 1 hypervisors are usually the ones you find loaded on a suspect machine

A

False

24
Q

Which tool allows network traffic to be viewed graphically

A

Etherape

25
Q

Which type of virtual machine software is typically, but not exclusively, loaded on servers or workstations with a lot of RAM and storage?

A

Type 1

26
Q

A forensic image of a VM includes all snapshots

A

False

27
Q

To find network adapters, you use ____________ command in Windows and the ____________ command in Linux

A

ipconfig, ifconfig

28
Q

A layered network defense strategy puts the most valuable data where?

A

In the innermost layer

29
Q

Packet analyzers examine what layers of the OSI model?

A

Layer 2 and 3

30
Q

Which of the following file extensions are associated with VMware virtual machines?

A

.vmx, .log, and .nvram

31
Q

In VirtualBox, a(n) ________ file contains settings for virtual hard drives

A

.vbox

32
Q

Which Registry key contains associations for file extensions?

A

HKEY_CLASSES_ROOT

33
Q

The number of VMs that can be supported per host by a type 1 hypervisor is generally determined by the amount of _____________ and ____________.

A

RAM, storage

34
Q

When do zero day attacks occur?

A

On the day the application or OS is released, before the vendor is aware of the vulnerability

35
Q

You can expect to find a type 2 hypervisor on what type of device?

A

Desktop, Smartphone, Tablet

36
Q

Which of the following is a clue that a virtual machine has been installed on a host system?

A

Virtual network adapter

37
Q

Virtual Machine Extensions (VMX) are part of which of the following?

A

Intel Virtualized Technology

38
Q

What are the three modes of protection in the DiD strategy?

A

People, Technology, Operations

39
Q

Tcpslice can be used to retrieve specific timeframes of packet captures

A

True