Filters
Question type

Study Flashcards

____________________ logs record traffic in and out of a network.

Correct Answer

verifed

verified

____ is a suite of tools created by Sysinternals.


A) EnCase
B) PsTools
C) R-Tools
D) Knoppix

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

Match each item with a statement below: -type of malware


A) Cyberforensics
B) Ethereal
C) Tripwire
D) PsGetSid
E) PsLoggedOn
F) Trojan horse
G) Knoppix
H) PsShutdown
I) oinkmaster

J) B) and H)
K) C) and D)

Correct Answer

verifed

verified

____ is a Sysinternals command that shows all Registry data in real time on a Windows computer.


A) PsReg
B) RegExplorer
C) RegMon
D) RegHandle

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

When intruders break into a network, they rarely leave a trail behind.

A) True
B) False

Correct Answer

verifed

verified

Detail a standard procedure for network forensics investigations.

Correct Answer

verifed

verified

A standard procedure you might use in ne...

View Answer

____ is the text version of Ethereal, a packet sniffer tool.


A) Tcpdump
B) Ethertext
C) Etherape
D) Tethereal

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

Match each item with a statement below: -an audit control program that detects anomalies in traffic and sends an alert automatically


A) Cyberforensics
B) Ethereal
C) Tripwire
D) PsGetSid
E) PsLoggedOn
F) Trojan horse
G) Knoppix
H) PsShutdown
I) oinkmaster

J) A) and I)
K) E) and G)

Correct Answer

verifed

verified

Explain The Auditor tool.

Correct Answer

verifed

verified

Another good Linux tool is The Auditor (...

View Answer

PsList from PsTools allows you to list detailed information about processes.

A) True
B) False

Correct Answer

verifed

verified

____ hide the most valuable data at the innermost part of the network.


A) Layered network defense strategies
B) Firewalls
C) Protocols
D) NAT

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

____________________ is a layered network defense strategy developed by the National Security Agency (NSA).

Correct Answer

verifed

verified

Defense in depth (Di...

View Answer

How should you proceed if your network forensic investigation involves other companies?

Correct Answer

verifed

verified

As with all investigations, keep preserv...

View Answer

The Knoppix STD tool ____ enables you to reset passwords on a Windows computer, including the administrator password


A) chntpw
B) john
C) oinkmaster
D) memfetch

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

____ is a good tool for extracting information from large Libpcap files.


A) Nmap
B) Tcpslice
C) Pcap
D) TCPcap

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Match each item with a statement below: -a bootable Linux CD intended for computer and network forensics


A) Cyberforensics
B) Ethereal
C) Tripwire
D) PsGetSid
E) PsLoggedOn
F) Trojan horse
G) Knoppix
H) PsShutdown
I) oinkmaster

J) B) and G)
K) C) and H)

Correct Answer

verifed

verified

Most packet sniffer tools can read anything captured in ____ format.


A) SYN
B) DOPI
C) PCAP
D) AIATP

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

____ can help you determine whether a network is truly under attack or a user has inadvertently installed an untested patch or custom program.


A) Broadcast forensics
B) Network forensics
C) Computer forensics
D) Traffic forensics

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

The U.K. Honeynet Project has created the ____________________. It contains the honeywall and honeypot on a bootable memory stick.

Correct Answer

verifed

verified

____ can be used to create a bootable forensic CD and perform a live acquisition.


A) Helix
B) DTDD
C) Inquisitor
D) Neon

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

Showing 21 - 40 of 50

Related Exams

Show Answer