Deck 11: Virtual Machines, Network Forensics, and Live Acquisitions

Full screen (f)
exit full mode
Question
Network forensics is a fast, easy process.
Use Space or
up arrow
down arrow
to flip the card.
Question
____ is a popular network intrusion detection system that performs packet capture and analysis in real time.

A) Ethereal
B) Snort
C) Tcpdump
D) john
Question
____ hide the most valuable data at the innermost part of the network.

A) Layered network defense strategies
B) Firewalls
C) Protocols
D) NAT
Question
A common way of examining network traffic is by running the ____ program.

A) Netdump
B) Slackdump
C) Coredump
D) Tcpdump
Question
When intruders break into a network, they rarely leave a trail behind.
Question
Ngrep cannot be used to examine e-mail headers or IRC chats.
Question
Helix operates in two modes:Windows Live (GUI or command line) and ____.

A) command Windows
B) remote GUI
C) command Linux
D) bootable Linux
Question
____ is a Sysinternals command that shows all Registry data in real time on a Windows computer.

A) PsReg
B) RegExplorer
C) RegMon
D) RegHandle
Question
____ can be used to create a bootable forensic CD and perform a live acquisition.

A) Helix
B) DTDD
C) Inquisitor
D) Neon
Question
Most packet sniffers operate on layer 2 or ____ of the OSI model.

A) 1
B) 3
C) 5
D) 7
Question
____ can help you determine whether a network is truly under attack or a user has inadvertently installed an untested patch or custom program.

A) Broadcast forensics
B) Network forensics
C) Computer forensics
D) Traffic forensics
Question
____ forensics is the systematic tracking of incoming and outgoing traffic on your network.

A) Network
B) Computer
C) Criminal
D) Server
Question
____ is the U.S. DoD computer forensics lab's version of the dd command that comes with Knoppix-STD.

A) chntpw
B) john
C) memfetch
D) dcfldd
Question
____ are devices and/or software placed on a network to monitor traffic.

A) Packet sniffers
B) Bridges
C) Hubs
D) Honeypots
Question
With the Knoppix STD tools on a portable CD, you can examine almost any network system.
Question
The Knoppix STD tool ____ enables you to reset passwords on a Windows computer, including the administrator password

A) chntpw
B) john
C) oinkmaster
D) memfetch
Question
PsList from PsTools allows you to list detailed information about processes.
Question
Most packet sniffer tools can read anything captured in ____ format.

A) SYN
B) DOPI
C) PCAP
D) AIATP
Question
____ is a suite of tools created by Sysinternals.

A) EnCase
B) PsTools
C) R-Tools
D) Knoppix
Question
The PSTools ____ kills processes by name or process ID.

A) PsExec
B) PsList
C) PsKill
D) PsShutdown
Question
The ____ Project was developed to make information widely available in an attempt to thwart Internet and network hackers.

A) Honeynet
B) Honeypot
C) Honeywall
D) Honeyweb
Question
____________________ is a layered network defense strategy developed by the National Security Agency (NSA).
Question
Match each item with a statement below
a.Cyberforensics
f.Trojan horse
b.Ethereal
g.Knoppix
c.Tripwire
h.PsShutdown
d.PsGetSid
i.oinkmaster
e.PsLoggedOn
a network analysis tool
Question
Match each item with a statement below
a.Cyberforensics
f.Trojan horse
b.Ethereal
g.Knoppix
c.Tripwire
h.PsShutdown
d.PsGetSid
i.oinkmaster
e.PsLoggedOn
type of malware
Question
The term ____________________ means how long a piece of information lasts on a system.
Question
____ is a good tool for extracting information from large Libpcap files.

A) Nmap
B) Tcpslice
C) Pcap
D) TCPcap
Question
Match each item with a statement below
a.Cyberforensics
f.Trojan horse
b.Ethereal
g.Knoppix
c.Tripwire
h.PsShutdown
d.PsGetSid
i.oinkmaster
e.PsLoggedOn
displays who's logged on locally
Question
In a(n) ____ attack, the attacker keeps asking your server to establish a connection.

A) SYN flood
B) ACK flood
C) brute-force attack
D) PCAP attack
Question
Match each item with a statement below
a.Cyberforensics
f.Trojan horse
b.Ethereal
g.Knoppix
c.Tripwire
h.PsShutdown
d.PsGetSid
i.oinkmaster
e.PsLoggedOn
usually refers to network forensics
Question
Match each item with a statement below
a.Cyberforensics
f.Trojan horse
b.Ethereal
g.Knoppix
c.Tripwire
h.PsShutdown
d.PsGetSid
i.oinkmaster
e.PsLoggedOn
a bootable Linux CD intended for computer and network forensics
Question
Match each item with a statement below
a.Cyberforensics
f.Trojan horse
b.Ethereal
g.Knoppix
c.Tripwire
h.PsShutdown
d.PsGetSid
i.oinkmaster
e.PsLoggedOn
an audit control program that detects anomalies in traffic and sends an alert automatically
Question
The PSTools ____________________ tool allows you to suspend processes.
Question
Match each item with a statement below
a.Cyberforensics
f.Trojan horse
b.Ethereal
g.Knoppix
c.Tripwire
h.PsShutdown
d.PsGetSid
i.oinkmaster
e.PsLoggedOn
helps manage snort rules so that you can specify what items to ignore as regular traffic and what items should raise alarms
Question
A ____ is a computer set up to look like any other machine on your network, but it lures the attacker to it.

A) honeywall
B) honeypot
C) honeynet
D) honeyhost
Question
Match each item with a statement below
a.Cyberforensics
f.Trojan horse
b.Ethereal
g.Knoppix
c.Tripwire
h.PsShutdown
d.PsGetSid
i.oinkmaster
e.PsLoggedOn
shuts down and optionally restarts a computer
Question
____________________ logs record traffic in and out of a network.
Question
Match each item with a statement below
a.Cyberforensics
f.Trojan horse
b.Ethereal
g.Knoppix
c.Tripwire
h.PsShutdown
d.PsGetSid
i.oinkmaster
e.PsLoggedOn
displays the security identifier (SID) of a computer or user
Question
____ is the text version of Ethereal, a packet sniffer tool.

A) Tcpdump
B) Ethertext
C) Etherape
D) Tethereal
Question
Machines used on a DDoS are known as ____ simply because they have unwittingly become part of the attack.

A) ISPs
B) soldiers
C) zombies
D) pawns
Question
The U.K. Honeynet Project has created the ____________________. It contains the honeywall and honeypot on a bootable memory stick.
Question
What is the general procedure for a live acquisition?
Question
When are live acquisitions useful?
Question
Explain The Auditor tool.
Question
Why is testing networks as important as testing servers?
Question
What are some of the tools included with the PSTools suite?
Question
How should you proceed if your network forensic investigation involves other companies?
Question
What are some of the tools included with Knoppix STD?
Question
What is Knoppix-STD?
Question
Describe some of the Windows tools available at Sysinternals.
Question
Detail a standard procedure for network forensics investigations.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 11: Virtual Machines, Network Forensics, and Live Acquisitions
1
Network forensics is a fast, easy process.
False
2
____ is a popular network intrusion detection system that performs packet capture and analysis in real time.

A) Ethereal
B) Snort
C) Tcpdump
D) john
B
3
____ hide the most valuable data at the innermost part of the network.

A) Layered network defense strategies
B) Firewalls
C) Protocols
D) NAT
A
4
A common way of examining network traffic is by running the ____ program.

A) Netdump
B) Slackdump
C) Coredump
D) Tcpdump
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
When intruders break into a network, they rarely leave a trail behind.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
Ngrep cannot be used to examine e-mail headers or IRC chats.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
Helix operates in two modes:Windows Live (GUI or command line) and ____.

A) command Windows
B) remote GUI
C) command Linux
D) bootable Linux
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
____ is a Sysinternals command that shows all Registry data in real time on a Windows computer.

A) PsReg
B) RegExplorer
C) RegMon
D) RegHandle
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
____ can be used to create a bootable forensic CD and perform a live acquisition.

A) Helix
B) DTDD
C) Inquisitor
D) Neon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
Most packet sniffers operate on layer 2 or ____ of the OSI model.

A) 1
B) 3
C) 5
D) 7
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
____ can help you determine whether a network is truly under attack or a user has inadvertently installed an untested patch or custom program.

A) Broadcast forensics
B) Network forensics
C) Computer forensics
D) Traffic forensics
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
____ forensics is the systematic tracking of incoming and outgoing traffic on your network.

A) Network
B) Computer
C) Criminal
D) Server
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
____ is the U.S. DoD computer forensics lab's version of the dd command that comes with Knoppix-STD.

A) chntpw
B) john
C) memfetch
D) dcfldd
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
____ are devices and/or software placed on a network to monitor traffic.

A) Packet sniffers
B) Bridges
C) Hubs
D) Honeypots
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
With the Knoppix STD tools on a portable CD, you can examine almost any network system.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
The Knoppix STD tool ____ enables you to reset passwords on a Windows computer, including the administrator password

A) chntpw
B) john
C) oinkmaster
D) memfetch
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
PsList from PsTools allows you to list detailed information about processes.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Most packet sniffer tools can read anything captured in ____ format.

A) SYN
B) DOPI
C) PCAP
D) AIATP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
____ is a suite of tools created by Sysinternals.

A) EnCase
B) PsTools
C) R-Tools
D) Knoppix
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
The PSTools ____ kills processes by name or process ID.

A) PsExec
B) PsList
C) PsKill
D) PsShutdown
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
The ____ Project was developed to make information widely available in an attempt to thwart Internet and network hackers.

A) Honeynet
B) Honeypot
C) Honeywall
D) Honeyweb
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
____________________ is a layered network defense strategy developed by the National Security Agency (NSA).
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Match each item with a statement below
a.Cyberforensics
f.Trojan horse
b.Ethereal
g.Knoppix
c.Tripwire
h.PsShutdown
d.PsGetSid
i.oinkmaster
e.PsLoggedOn
a network analysis tool
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
Match each item with a statement below
a.Cyberforensics
f.Trojan horse
b.Ethereal
g.Knoppix
c.Tripwire
h.PsShutdown
d.PsGetSid
i.oinkmaster
e.PsLoggedOn
type of malware
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
The term ____________________ means how long a piece of information lasts on a system.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
____ is a good tool for extracting information from large Libpcap files.

A) Nmap
B) Tcpslice
C) Pcap
D) TCPcap
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
Match each item with a statement below
a.Cyberforensics
f.Trojan horse
b.Ethereal
g.Knoppix
c.Tripwire
h.PsShutdown
d.PsGetSid
i.oinkmaster
e.PsLoggedOn
displays who's logged on locally
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
In a(n) ____ attack, the attacker keeps asking your server to establish a connection.

A) SYN flood
B) ACK flood
C) brute-force attack
D) PCAP attack
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
Match each item with a statement below
a.Cyberforensics
f.Trojan horse
b.Ethereal
g.Knoppix
c.Tripwire
h.PsShutdown
d.PsGetSid
i.oinkmaster
e.PsLoggedOn
usually refers to network forensics
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
Match each item with a statement below
a.Cyberforensics
f.Trojan horse
b.Ethereal
g.Knoppix
c.Tripwire
h.PsShutdown
d.PsGetSid
i.oinkmaster
e.PsLoggedOn
a bootable Linux CD intended for computer and network forensics
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
Match each item with a statement below
a.Cyberforensics
f.Trojan horse
b.Ethereal
g.Knoppix
c.Tripwire
h.PsShutdown
d.PsGetSid
i.oinkmaster
e.PsLoggedOn
an audit control program that detects anomalies in traffic and sends an alert automatically
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
The PSTools ____________________ tool allows you to suspend processes.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
Match each item with a statement below
a.Cyberforensics
f.Trojan horse
b.Ethereal
g.Knoppix
c.Tripwire
h.PsShutdown
d.PsGetSid
i.oinkmaster
e.PsLoggedOn
helps manage snort rules so that you can specify what items to ignore as regular traffic and what items should raise alarms
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
A ____ is a computer set up to look like any other machine on your network, but it lures the attacker to it.

A) honeywall
B) honeypot
C) honeynet
D) honeyhost
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
Match each item with a statement below
a.Cyberforensics
f.Trojan horse
b.Ethereal
g.Knoppix
c.Tripwire
h.PsShutdown
d.PsGetSid
i.oinkmaster
e.PsLoggedOn
shuts down and optionally restarts a computer
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
____________________ logs record traffic in and out of a network.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
Match each item with a statement below
a.Cyberforensics
f.Trojan horse
b.Ethereal
g.Knoppix
c.Tripwire
h.PsShutdown
d.PsGetSid
i.oinkmaster
e.PsLoggedOn
displays the security identifier (SID) of a computer or user
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
____ is the text version of Ethereal, a packet sniffer tool.

A) Tcpdump
B) Ethertext
C) Etherape
D) Tethereal
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
Machines used on a DDoS are known as ____ simply because they have unwittingly become part of the attack.

A) ISPs
B) soldiers
C) zombies
D) pawns
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
The U.K. Honeynet Project has created the ____________________. It contains the honeywall and honeypot on a bootable memory stick.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
What is the general procedure for a live acquisition?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
When are live acquisitions useful?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
Explain The Auditor tool.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
Why is testing networks as important as testing servers?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
What are some of the tools included with the PSTools suite?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
How should you proceed if your network forensic investigation involves other companies?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
What are some of the tools included with Knoppix STD?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
What is Knoppix-STD?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
Describe some of the Windows tools available at Sysinternals.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
Detail a standard procedure for network forensics investigations.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.