Deck 10: Virtual Machine and Cloud Forensics

Full screen (f)
exit full mode
Question
Select the file below that is used in VirtualBox to create a virtual machine:​

A)​.vdi
B)​.vbox
C).r0
D).ova
Use Space or
up arrow
down arrow
to flip the card.
Question
What utility is best suited to examine e-mail headers or chat logs, or network communication between worms and viruses?​

A)​tcpdump
B)​Argus
C)Ngrep
D)Tcpslice
Question
What virtual machine software supports all Windows and Linux OSs as well as Macintosh and Solaris, and is provided as shareware?​

A)​KVM
B)​Parallels
C)Microsoft Virtual PC
D)VirtualBox
Question
What file type below, associated with VMWare, stores VM paging files that are used as RAM for a virtual machine?​

A)​.nvram
B)​.vmem
C) .​vmpage
D).vmx
Question
In VirtualBox, ____________ different types of virtual network adapters are possible, such as AMD and Intel Pro adapters.​

A)​2
B)​4
C)6
D)8
Question
Forensics tools can't directly mount VMs as external drives.​
Question
What processor instruction set is required in order to utilize virtualization software?​

A)​AMD-VT
B)​Intel VirtualBit
C)Virtual Machine Extensions (VMX)
D)Virtual Hardware Extensions (VHX)
Question
The _____________________ tool is an updated version of BackTrack, and contains more than 300 tools, such as password crackers, network sniffers, and freeware forensics tools.​

A)​Kali Linux
B)​Ubuntu
C)OSForensics
D)Sleuth Kit
Question
The ___________________ is a good tool for extracting information from large Libpcap files; you simply specify the time frame you want to examine.

A)​Tcpdstat
B)​Tcpslice
C)Ngrep
D)tcpdump
Question
What Windows Registry key contains associations for file extensions?​

A)​HKEY_CLASSES_ROOT
B)​HKEY_USERS
C)HKEY_LOCAL_MACHINE
D)HKEY_CURRENT_CONFIG
Question
In Windows, what PowerShell cmdlet can be used in conjunction with Get-VM​ to display a virtual machine's network adapters?

A)​Show-NetworkAdapters
B)​Query-ipconfig
C)Get-VMNetworkAdapter
D)Dump-Netconfig
Question
Select below the program within the PsTools suite that allows you to run processes remotely:​

A)​PsService
B)​PsPasswd
C)PsRemote
D)PsExec
Question
Select below the option that is not a common type 1 hypervisor:​

A)​VMware vSphere
B)​Microsoft Hyper-V
C)Citirix XenServer
D)Oracle VirtualBox
Question
The __________ disk image file format is associated with the VirtualBox hypervisor.​

A).​vmdk
B)​.hda
C).vhd
D).vdi
Question
The __________________ is the version of Pcap available for Linux based operating systems.​

A)​Winpcap
B)​Libpcap
C)Tcpcap
D)Netcap
Question
The Honeynet Project was developed to make information widely available in an attempt to thwart Internet and network attackers.​
Question
The NSA's defense in depth (DiD) strategy contains three modes of protection. Which option below is not one of the three modes?​

A)​People
B)​Technology
C)Operations
D)Management
Question
The capability of type 1 hypervisors is limited only by the amount of available RAM, storage, and throughput.​
Question
Type 2 hypervisors are typically loaded on servers or workstations with a lot of RAM and storage.​
Question
The Sysinternals Handle utility shows only file system activity, but does not show what processes are using files on the file system.
Question
?Match the following terms with the correct definitions below:?

-?Intrusion prevention and monitoring systems that track what attackers do on honeypots.

A)?defense in depth (DiD)
B)distributed denial-of-service (DDoS) attacks
C)?honeypot
D)honeywalls?
E)?layered network defense strategy
F)network forensics?
G)?type 1 hypervisor
H)type 2 hypervisor?
I)?zero day attacks
J)zombies
Question
?Match the following terms with the correct definitions below:?

-Attacks launched before vendors or network administrators have discovered vulnerabilities and patches for them have been released.?

A)?defense in depth (DiD)
B)distributed denial-of-service (DDoS) attacks
C)?honeypot
D)honeywalls?
E)?layered network defense strategy
F)network forensics?
G)?type 1 hypervisor
H)type 2 hypervisor?
I)?zero day attacks
J)zombies
Question
?Match the following terms with the correct definitions below:?

-Computers used without the owners' knowledge in a DDoS attack.?

A)?defense in depth (DiD)
B)distributed denial-of-service (DDoS) attacks
C)?honeypot
D)honeywalls?
E)?layered network defense strategy
F)network forensics?
G)?type 1 hypervisor
H)type 2 hypervisor?
I)?zero day attacks
J)zombies
Question
In a __________ attack, the attacker keeps asking your server to establish a connection, with the intent of overloading a server with established connections.​

A)smurf​
B)​SYN flood
C)spoof
D)ghost
Question
The ___________________ utility can be used to view network traffic graphically.​
Question
The ​tcpdump and Wireshark utilities both use what well known packet capture format?

A)​Netcap
B)​Pcap
C)Packetd
D)RAW
Question
The ___________________ utility from Sysinternals shows what files, Registry keys, and DLLs are loaded at a specific time.​
Question
?The _______________ command line program is a common way of examining network traffic, which provides records of network activity while it is running, and produce hundreds or thousands of records.

A)?netstat
B)?ls
C)ifconfig
D)tcpdump
Question
The ________________ software lists all open network sockets, including those hidden by rootkits, and also works on both 32-bit and 64-bit systems.​
Question
?Match the following terms with the correct definitions below:?

-The process of collecting and analyzing raw network data and systematically tracking network traffic to determine how security incidents occur.?

A)?defense in depth (DiD)
B)distributed denial-of-service (DDoS) attacks
C)?honeypot
D)honeywalls?
E)?layered network defense strategy
F)network forensics?
G)?type 1 hypervisor
H)type 2 hypervisor?
I)?zero day attacks
J)zombies
Question
?Match the following terms with the correct definitions below:?

-A computer or network set up to lure an attacker.?

A)?defense in depth (DiD)
B)distributed denial-of-service (DDoS) attacks
C)?honeypot
D)honeywalls?
E)?layered network defense strategy
F)network forensics?
G)?type 1 hypervisor
H)type 2 hypervisor?
I)?zero day attacks
J)zombies
Question
?Match the following terms with the correct definitions below:?

-A virtual machine interface that's loaded on top of an existing OS.?

A)?defense in depth (DiD)
B)distributed denial-of-service (DDoS) attacks
C)?honeypot
D)honeywalls?
E)?layered network defense strategy
F)network forensics?
G)?type 1 hypervisor
H)type 2 hypervisor?
I)?zero day attacks
J)zombies
Question
At what layers of the OSI model do most packet analyzers function?​

A)​Layer 1 or 2
B)​Layer 2 or 3
C)Layer 3 or 4
D)Layer 4 or 5
Question
?Match the following terms with the correct definitions below:?

-?A type of DoS attack in which other online machines are used, without the owner's knowledge, to launch an attack.

A)?defense in depth (DiD)
B)distributed denial-of-service (DDoS) attacks
C)?honeypot
D)honeywalls?
E)?layered network defense strategy
F)network forensics?
G)?type 1 hypervisor
H)type 2 hypervisor?
I)?zero day attacks
J)zombies
Question
__________________ help offset hardware costs for companies and are handy when you want to run legacy or uncommon OSs and software along with the other software on your computer.​
Question
?Match the following terms with the correct definitions below:?

-?The NSA's approach to implementing a layered network defense strategy. It focuses on three modes of protection: people, technology, and operations.

A)?defense in depth (DiD)
B)distributed denial-of-service (DDoS) attacks
C)?honeypot
D)honeywalls?
E)?layered network defense strategy
F)network forensics?
G)?type 1 hypervisor
H)type 2 hypervisor?
I)?zero day attacks
J)zombies
Question
?Match the following terms with the correct definitions below:?

-?A virtual machine interface that loads on physical hardware and contains its own OS.

A)?defense in depth (DiD)
B)distributed denial-of-service (DDoS) attacks
C)?honeypot
D)honeywalls?
E)?layered network defense strategy
F)network forensics?
G)?type 1 hypervisor
H)type 2 hypervisor?
I)?zero day attacks
J)zombies
Question
Updating security patches, antivirus software, and OSs fall into the ________________ category of the defense in depth strategy.​
Question
?Match the following terms with the correct definitions below:?

-An approach to network hardening that sets up several network layers to place the most valuable data at the innermost part of the network?

A)?defense in depth (DiD)
B)distributed denial-of-service (DDoS) attacks
C)?honeypot
D)honeywalls?
E)?layered network defense strategy
F)network forensics?
G)?type 1 hypervisor
H)type 2 hypervisor?
I)?zero day attacks
J)zombies
Question
The SANS Investigative Forensics Toolkit (SIFT) appliance can currently only be installed on what version of Ubuntu?​

A)​12.04
B)​13.11
C)14.04
D)14.11
Question
Describe a zero day attack.​
Question
What is a packet analyzer, and how is it used?​
Question
​Define network forensics, and explain how network forensics can be used.
Question
What is a VM snapshot, and why is a live acquisition typically required for VMs?​
Question
Describe the defense in depth (DiD) strategy, and outline each of the three modes of protection.​
Question
What is the biggest problem with live acquisitions?​
Question
Explain the need for using established procedures for acquiring data after an attack or intrusion incident, and list some resources that address these needs.​
Question
Describe the standard procedure for performing network forensics.​
Question
Why are live acquisitions becoming a necessity, and why don't live acquisitions follow typical forensics procedures?​
Question
What is the difference between a type 1 and a type 2 hypervisor?​
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 10: Virtual Machine and Cloud Forensics
1
Select the file below that is used in VirtualBox to create a virtual machine:​

A)​.vdi
B)​.vbox
C).r0
D).ova
D
2
What utility is best suited to examine e-mail headers or chat logs, or network communication between worms and viruses?​

A)​tcpdump
B)​Argus
C)Ngrep
D)Tcpslice
C
3
What virtual machine software supports all Windows and Linux OSs as well as Macintosh and Solaris, and is provided as shareware?​

A)​KVM
B)​Parallels
C)Microsoft Virtual PC
D)VirtualBox
D
4
What file type below, associated with VMWare, stores VM paging files that are used as RAM for a virtual machine?​

A)​.nvram
B)​.vmem
C) .​vmpage
D).vmx
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
In VirtualBox, ____________ different types of virtual network adapters are possible, such as AMD and Intel Pro adapters.​

A)​2
B)​4
C)6
D)8
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
Forensics tools can't directly mount VMs as external drives.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
What processor instruction set is required in order to utilize virtualization software?​

A)​AMD-VT
B)​Intel VirtualBit
C)Virtual Machine Extensions (VMX)
D)Virtual Hardware Extensions (VHX)
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
The _____________________ tool is an updated version of BackTrack, and contains more than 300 tools, such as password crackers, network sniffers, and freeware forensics tools.​

A)​Kali Linux
B)​Ubuntu
C)OSForensics
D)Sleuth Kit
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
The ___________________ is a good tool for extracting information from large Libpcap files; you simply specify the time frame you want to examine.

A)​Tcpdstat
B)​Tcpslice
C)Ngrep
D)tcpdump
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
What Windows Registry key contains associations for file extensions?​

A)​HKEY_CLASSES_ROOT
B)​HKEY_USERS
C)HKEY_LOCAL_MACHINE
D)HKEY_CURRENT_CONFIG
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
In Windows, what PowerShell cmdlet can be used in conjunction with Get-VM​ to display a virtual machine's network adapters?

A)​Show-NetworkAdapters
B)​Query-ipconfig
C)Get-VMNetworkAdapter
D)Dump-Netconfig
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
Select below the program within the PsTools suite that allows you to run processes remotely:​

A)​PsService
B)​PsPasswd
C)PsRemote
D)PsExec
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
Select below the option that is not a common type 1 hypervisor:​

A)​VMware vSphere
B)​Microsoft Hyper-V
C)Citirix XenServer
D)Oracle VirtualBox
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
The __________ disk image file format is associated with the VirtualBox hypervisor.​

A).​vmdk
B)​.hda
C).vhd
D).vdi
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
The __________________ is the version of Pcap available for Linux based operating systems.​

A)​Winpcap
B)​Libpcap
C)Tcpcap
D)Netcap
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
The Honeynet Project was developed to make information widely available in an attempt to thwart Internet and network attackers.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
The NSA's defense in depth (DiD) strategy contains three modes of protection. Which option below is not one of the three modes?​

A)​People
B)​Technology
C)Operations
D)Management
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
The capability of type 1 hypervisors is limited only by the amount of available RAM, storage, and throughput.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
Type 2 hypervisors are typically loaded on servers or workstations with a lot of RAM and storage.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
The Sysinternals Handle utility shows only file system activity, but does not show what processes are using files on the file system.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
?Match the following terms with the correct definitions below:?

-?Intrusion prevention and monitoring systems that track what attackers do on honeypots.

A)?defense in depth (DiD)
B)distributed denial-of-service (DDoS) attacks
C)?honeypot
D)honeywalls?
E)?layered network defense strategy
F)network forensics?
G)?type 1 hypervisor
H)type 2 hypervisor?
I)?zero day attacks
J)zombies
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
?Match the following terms with the correct definitions below:?

-Attacks launched before vendors or network administrators have discovered vulnerabilities and patches for them have been released.?

A)?defense in depth (DiD)
B)distributed denial-of-service (DDoS) attacks
C)?honeypot
D)honeywalls?
E)?layered network defense strategy
F)network forensics?
G)?type 1 hypervisor
H)type 2 hypervisor?
I)?zero day attacks
J)zombies
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
?Match the following terms with the correct definitions below:?

-Computers used without the owners' knowledge in a DDoS attack.?

A)?defense in depth (DiD)
B)distributed denial-of-service (DDoS) attacks
C)?honeypot
D)honeywalls?
E)?layered network defense strategy
F)network forensics?
G)?type 1 hypervisor
H)type 2 hypervisor?
I)?zero day attacks
J)zombies
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
In a __________ attack, the attacker keeps asking your server to establish a connection, with the intent of overloading a server with established connections.​

A)smurf​
B)​SYN flood
C)spoof
D)ghost
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
The ___________________ utility can be used to view network traffic graphically.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
The ​tcpdump and Wireshark utilities both use what well known packet capture format?

A)​Netcap
B)​Pcap
C)Packetd
D)RAW
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
The ___________________ utility from Sysinternals shows what files, Registry keys, and DLLs are loaded at a specific time.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
?The _______________ command line program is a common way of examining network traffic, which provides records of network activity while it is running, and produce hundreds or thousands of records.

A)?netstat
B)?ls
C)ifconfig
D)tcpdump
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
The ________________ software lists all open network sockets, including those hidden by rootkits, and also works on both 32-bit and 64-bit systems.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
?Match the following terms with the correct definitions below:?

-The process of collecting and analyzing raw network data and systematically tracking network traffic to determine how security incidents occur.?

A)?defense in depth (DiD)
B)distributed denial-of-service (DDoS) attacks
C)?honeypot
D)honeywalls?
E)?layered network defense strategy
F)network forensics?
G)?type 1 hypervisor
H)type 2 hypervisor?
I)?zero day attacks
J)zombies
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
?Match the following terms with the correct definitions below:?

-A computer or network set up to lure an attacker.?

A)?defense in depth (DiD)
B)distributed denial-of-service (DDoS) attacks
C)?honeypot
D)honeywalls?
E)?layered network defense strategy
F)network forensics?
G)?type 1 hypervisor
H)type 2 hypervisor?
I)?zero day attacks
J)zombies
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
?Match the following terms with the correct definitions below:?

-A virtual machine interface that's loaded on top of an existing OS.?

A)?defense in depth (DiD)
B)distributed denial-of-service (DDoS) attacks
C)?honeypot
D)honeywalls?
E)?layered network defense strategy
F)network forensics?
G)?type 1 hypervisor
H)type 2 hypervisor?
I)?zero day attacks
J)zombies
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
At what layers of the OSI model do most packet analyzers function?​

A)​Layer 1 or 2
B)​Layer 2 or 3
C)Layer 3 or 4
D)Layer 4 or 5
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
?Match the following terms with the correct definitions below:?

-?A type of DoS attack in which other online machines are used, without the owner's knowledge, to launch an attack.

A)?defense in depth (DiD)
B)distributed denial-of-service (DDoS) attacks
C)?honeypot
D)honeywalls?
E)?layered network defense strategy
F)network forensics?
G)?type 1 hypervisor
H)type 2 hypervisor?
I)?zero day attacks
J)zombies
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
__________________ help offset hardware costs for companies and are handy when you want to run legacy or uncommon OSs and software along with the other software on your computer.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
?Match the following terms with the correct definitions below:?

-?The NSA's approach to implementing a layered network defense strategy. It focuses on three modes of protection: people, technology, and operations.

A)?defense in depth (DiD)
B)distributed denial-of-service (DDoS) attacks
C)?honeypot
D)honeywalls?
E)?layered network defense strategy
F)network forensics?
G)?type 1 hypervisor
H)type 2 hypervisor?
I)?zero day attacks
J)zombies
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
?Match the following terms with the correct definitions below:?

-?A virtual machine interface that loads on physical hardware and contains its own OS.

A)?defense in depth (DiD)
B)distributed denial-of-service (DDoS) attacks
C)?honeypot
D)honeywalls?
E)?layered network defense strategy
F)network forensics?
G)?type 1 hypervisor
H)type 2 hypervisor?
I)?zero day attacks
J)zombies
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
Updating security patches, antivirus software, and OSs fall into the ________________ category of the defense in depth strategy.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
?Match the following terms with the correct definitions below:?

-An approach to network hardening that sets up several network layers to place the most valuable data at the innermost part of the network?

A)?defense in depth (DiD)
B)distributed denial-of-service (DDoS) attacks
C)?honeypot
D)honeywalls?
E)?layered network defense strategy
F)network forensics?
G)?type 1 hypervisor
H)type 2 hypervisor?
I)?zero day attacks
J)zombies
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
The SANS Investigative Forensics Toolkit (SIFT) appliance can currently only be installed on what version of Ubuntu?​

A)​12.04
B)​13.11
C)14.04
D)14.11
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
Describe a zero day attack.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
What is a packet analyzer, and how is it used?​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
​Define network forensics, and explain how network forensics can be used.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
What is a VM snapshot, and why is a live acquisition typically required for VMs?​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
Describe the defense in depth (DiD) strategy, and outline each of the three modes of protection.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
What is the biggest problem with live acquisitions?​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
Explain the need for using established procedures for acquiring data after an attack or intrusion incident, and list some resources that address these needs.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
Describe the standard procedure for performing network forensics.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
Why are live acquisitions becoming a necessity, and why don't live acquisitions follow typical forensics procedures?​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
What is the difference between a type 1 and a type 2 hypervisor?​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.