Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Computer Forensics Study Set 1
Quiz 10: Virtual Machine and Cloud Forensics
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Multiple Choice
?Match the following terms with the correct definitions below:? -?Intrusion prevention and monitoring systems that track what attackers do on honeypots.
Question 22
Multiple Choice
?Match the following terms with the correct definitions below:? -Attacks launched before vendors or network administrators have discovered vulnerabilities and patches for them have been released.?
Question 23
Multiple Choice
?Match the following terms with the correct definitions below:? -Computers used without the owners' knowledge in a DDoS attack.?
Question 24
Multiple Choice
In a __________ attack, the attacker keeps asking your server to establish a connection, with the intent of overloading a server with established connections.
Question 25
Short Answer
The ___________________ utility can be used to view network traffic graphically.
Question 26
Multiple Choice
The tcpdump and Wireshark utilities both use what well known packet capture format?
Question 27
Short Answer
The ___________________ utility from Sysinternals shows what files, Registry keys, and DLLs are loaded at a specific time.
Question 28
Multiple Choice
?The _______________ command line program is a common way of examining network traffic, which provides records of network activity while it is running, and produce hundreds or thousands of records.
Question 29
Short Answer
The ________________ software lists all open network sockets, including those hidden by rootkits, and also works on both 32-bit and 64-bit systems.
Question 30
Multiple Choice
?Match the following terms with the correct definitions below:? -The process of collecting and analyzing raw network data and systematically tracking network traffic to determine how security incidents occur.?
Question 31
Multiple Choice
?Match the following terms with the correct definitions below:? -A computer or network set up to lure an attacker.?
Question 32
Multiple Choice
?Match the following terms with the correct definitions below:? -A virtual machine interface that's loaded on top of an existing OS.?
Question 33
Multiple Choice
At what layers of the OSI model do most packet analyzers function?
Question 34
Multiple Choice
?Match the following terms with the correct definitions below:? -?A type of DoS attack in which other online machines are used, without the owner's knowledge, to launch an attack.
Question 35
Short Answer
__________________ help offset hardware costs for companies and are handy when you want to run legacy or uncommon OSs and software along with the other software on your computer.
Question 36
Multiple Choice
?Match the following terms with the correct definitions below:? -?The NSA's approach to implementing a layered network defense strategy. It focuses on three modes of protection: people, technology, and operations.