Chapter 10 Homework Before Patch Available Before The Vendor Aware

subject Type Homework Help
subject Pages 3
subject Words 517
subject Authors Amelia Phillips, Bill Nelson, Christopher Steuart

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Guide to Computer Forensics and Investigations, 5th Edition,
Ch. 10 Solutions-1
Chapter 10 Solutions
Review Questions
1. Virtual Machine Extensions (VMX) are part of which of the following?
2. You can expect to find a type 2 hypervisor on what type of device? (Choose all that
apply.)
3. Which of the following file extensions are associated with VMware virtual
machines?
4. In VirtualBox, a(n) ____________________ file contains settings for virtual hard
drives.
5. The number of VMs that can be supported per host by a type 1 hypervisor is
generally determined by the amount of __________ and ______________.
6. A forensic image of a VM includes all snapshots. True or False?
7. Which Registry key contains associations for file extensions?
8. Which of the following is a clue that a virtual machine has been installed on a host
system?
9. To find network adapters, you use the ________ command in Windows and the
_______________ command in Linux.
10. What are the three modes of protection in the DiD strategy?
11. A layered network defense strategy puts the most valuable data where?
12. Tcpslice can be used to retrieve specific timeframes of packet captures. True or
False?
13. Packet analyzers examine what layers of the OSI model?
page-pf2
Guide to Computer Forensics and Investigations, 5th Edition,
Ch. 10 Solutions-2
14. When do zero day attacks occur? (Choose all that apply.)
Hands-On Projects
Hands-On Project 10-1
Hands-On Project 10-2
Hands-On Project 10-3
Hands-On Project 10-4
Hands-On Project 10-5
This project allows students to explore the USB SANS SIFT toolkit.
Case Projects
Case Project 10-1
Students should discover that other tools, such as FTK Imager Lite and OSForensics, have
Case Project 10-2
Case Project 10-3
Students should document the procedure they used to mount the VM as an external drive in
OSForensics.
page-pf3
Guide to Computer Forensics and Investigations, 5th Edition,
Ch. 10 Solutions-3
Case Project 10-4

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.