Filters
Question type

Study Flashcards

The __________________ is the version of Pcap available for Linux based operating systems.​


A) ​Winpcap
B) ​Libpcap
C) Tcpcap
D) Netcap

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What processor instruction set is required in order to utilize virtualization software?​


A) ​AMD-VT
B) ​Intel VirtualBit
C) Virtual Machine Extensions (VMX)
D) Virtual Hardware Extensions (VHX)

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

The ________________ software lists all open network sockets, including those hidden by rootkits, and also works on both 32-bit and 64-bit systems.​

Correct Answer

verifed

verified

?Match the following terms with the correct definitions below:? -A virtual machine interface that's loaded on top of an existing OS.?


A) ?defense in depth (DiD)
B) distributed denial-of-service (DDoS) attacks
C) ?honeypot
D) honeywalls?
E) ?layered network defense strategy
F) network forensics?
G) ?type 1 hypervisor
H) type 2 hypervisor?
I) ?zero day attacks
J) zombies

K) C) and F)
L) E) and F)

Correct Answer

verifed

verified

The Sysinternals Handle utility shows only file system activity, but does not show what processes are using files on the file system.

A) True
B) False

Correct Answer

verifed

verified

Describe a zero day attack.​

Correct Answer

verifed

verified

In a typical zero day attack, attackers ...

View Answer

?Match the following terms with the correct definitions below:? -Computers used without the owners' knowledge in a DDoS attack.?


A) ?defense in depth (DiD)
B) distributed denial-of-service (DDoS) attacks
C) ?honeypot
D) honeywalls?
E) ?layered network defense strategy
F) network forensics?
G) ?type 1 hypervisor
H) type 2 hypervisor?
I) ?zero day attacks
J) zombies

K) D) and E)
L) C) and E)

Correct Answer

verifed

verified

The ___________________ is a good tool for extracting information from large Libpcap files; you simply specify the time frame you want to examine.


A) ​Tcpdstat
B) ​Tcpslice
C) Ngrep
D) tcpdump

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

__________________ help offset hardware costs for companies and are handy when you want to run legacy or uncommon OSs and software along with the other software on your computer.​

Correct Answer

verifed

verified

The __________ disk image file format is associated with the VirtualBox hypervisor.​


A) .​vmdk
B) ​.hda
C) .vhd
D) .vdi

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

Select the file below that is used in VirtualBox to create a virtual machine:​


A) ​.vdi
B) ​.vbox
C) .r0
D) .ova

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

What Windows Registry key contains associations for file extensions?​


A) ​HKEY_CLASSES_ROOT
B) ​HKEY_USERS
C) HKEY_LOCAL_MACHINE
D) HKEY_CURRENT_CONFIG

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

The capability of type 1 hypervisors is limited only by the amount of available RAM, storage, and throughput.​

A) True
B) False

Correct Answer

verifed

verified

Select below the program within the PsTools suite that allows you to run processes remotely:​


A) ​PsService
B) ​PsPasswd
C) PsRemote
D) PsExec

E) A) and B)
F) A) and D)

Correct Answer

verifed

verified

?Match the following terms with the correct definitions below:? -A computer or network set up to lure an attacker.?


A) ?defense in depth (DiD)
B) distributed denial-of-service (DDoS) attacks
C) ?honeypot
D) honeywalls?
E) ?layered network defense strategy
F) network forensics?
G) ?type 1 hypervisor
H) type 2 hypervisor?
I) ?zero day attacks
J) zombies

K) B) and F)
L) D) and H)

Correct Answer

verifed

verified

Forensics tools can't directly mount VMs as external drives.​

A) True
B) False

Correct Answer

verifed

verified

What file type below, associated with VMWare, stores VM paging files that are used as RAM for a virtual machine?​


A) ​.nvram
B) ​.vmem
C) .​vmpage
D) .vmx

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

The NSA's defense in depth (DiD) strategy contains three modes of protection. Which option below is not one of the three modes?​


A) ​People
B) ​Technology
C) Operations
D) Management

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

In Windows, what PowerShell cmdlet can be used in conjunction with Get-VM​ to display a virtual machine's network adapters?


A) ​Show-NetworkAdapters
B) ​Query-ipconfig
C) Get-VMNetworkAdapter
D) Dump-Netconfig

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

The Honeynet Project was developed to make information widely available in an attempt to thwart Internet and network attackers.​

A) True
B) False

Correct Answer

verifed

verified

Showing 21 - 40 of 50

Related Exams

Show Answer