Chapt 10

11 September 2022
4.7 (114 reviews)
20 test answers

Unlock all answers in this set

Unlock answers (16)
question
​The _______________ command line program is a common way of examining network traffic, which provides records of network activity while it is running, and produce hundreds or thousands of records.
answer
​tcpdump
question
At what layers of the OSI model do most packet analyzers function?​
answer
​Layer 2 or 3
question
In VirtualBox, ____________ different types of virtual network adapters are possible, such as AMD and Intel Pro adapters.​
answer
​6
question
In Windows, what PowerShell cmdlet can be used in conjunction with Get-VM​ to display a virtual machine's network adapters?
answer
​Get-VMNetworkAdapter
question
In a __________ attack, the attacker keeps asking your server to establish a connection, with the intent of overloading a server with established connections.​
answer
​SYN flood
question
Select below the option that is not a common type 1 hypervisor:​
answer
​Oracle VirtualBox
question
Select below the program within the PsTools suite that allows you to run processes remotely:​
answer
PsExec
question
Select the file below that is used in VirtualBox to create a virtual machine:​
answer
​.ova
question
The ​tcpdump and Wireshark utilities both use what well known packet capture format?
answer
Pcap
question
The NSA's defense in depth (DiD) strategy contains three modes of protection. Which option below is not one of the three modes?​
answer
Management
question
The SANS Investigative Forensics Toolkit (SIFT) appliance can currently only be installed on what version of Ubuntu?​
answer
12.04
question
The __________ disk image file format is associated with the VirtualBox hypervisor.​
answer
​.vdi
question
The __________________ is the version of Pcap available for Linux based operating systems.​
answer
Libpcap
question
The ___________________ is a good tool for extracting information from large Libpcap files; you simply specify the time frame you want to examine.
answer
Tcpslice
question
The _____________________ tool is an updated version of BackTrack, and contains more than 300 tools, such as password crackers, network sniffers, and freeware forensics tools.​
answer
​Kali Linux
question
What Windows Registry key contains associations for file extensions?​
answer
HKEY_CLASSES_ROOT
question
What file type below, associated with VMWare, stores VM paging files that are used as RAM for a virtual machine?​
answer
vmem
question
What processor instruction set is required in order to utilize virtualization software?​
answer
​Virtual Machine Extensions (VMX)
question
What utility is best suited to examine e-mail headers or chat logs, or network communication between worms and viruses?​
answer
Ngrep
question
What virtual machine software supports all Windows and Linux OSs as well as Macintosh and Solaris, and is provided as shareware?​
answer
​VirtualBox