Varsha
T2 2021: ICT741 Digital Forensics
Tutorial 7
Questions and Projects are prepared from Cengage Learning Resource ‘Guide to Computer Forensics and Investigations’. Nelson, B, Phillips, A. &
Steuart, C 2018, Sixth Edition, Cengage Learning US. Mason. OH
ICT741 Tutorial 7 Compiled by: Dr Saeid Iranmanesh Date: 5 July 2021
Review Questions
1. Explain Virtual Machine Extensions (VMX) are part of which
technology?
Intel virtualized technology
2. You can expect to find a type 2 hypervisor on what type of device?
Laptop, desktop, tablet
3. Which of the file extensions are associated with VMware virtual
machines?
vmdk, vmsd, vmx, nvram
4. In VirtualBox, a(n) .vbox file contains settings for virtual hard drives.
5. The number of VMs that can be supported per host by a type 1 hypervisor
is generally determined by the amount of RAM and Storage.
6. A forensic image of a VM includes all snapshots. True or False?
False
7. Which Registry key contains associations for file extensions?
hkey_classes_root
8. How do you know that a virtual machine has been installed on a host
system?
9. To find network adapters, you use the ipconfig command in Windows and
the ifconfig command in Linux.
10. What are the three modes of protection in the DiD strategy?
People, technology, operations
11. A layered network defense strategy puts the most valuable data
where?
Innermost part of the network
12. Tcpslice can be used to retrieve specific timeframes of packet captures.
True or False?
True
13. Packet analyzers examine what layers of the OSI model?
Layer 2 and 3
14. When do zero-day attacks occur?
Before patch is available
Questions and Projects are prepared from Cengage Learning Resource ‘Guide to Computer Forensics and Investigations’. Nelson, B, Phillips, A. &
Steuart, C 2018, Sixth Edition, Cengage Learning US. Mason. OH
ICT741 Tutorial 7 Compiled by: Dr Saeid Iranmanesh Date: 5 July 2021
Questions and Projects are prepared from Cengage Learning Resource ‘Guide to Computer Forensics and Investigations’. Nelson, B, Phillips, A. &
Steuart, C 2018, Sixth Edition, Cengage Learning US. Mason. OH
ICT741 Tutorial 7 Compiled by: Dr Saeid Iranmanesh Date: 5 July 2021
Quick Quiz 1
1. A type 2 hypervisor rests on top of an existing OS, such as Windows, Linux, or Mac
OS.
2. True or False: Instruction sets called Virtual Machine Extensions (VMX) are
necessary to use virtualization; without these instruction sets, virtualization
software doesn’t work.
True
3. By linking a VM’s IP address to log files, you might be able to determine what Web
sites the VM accessed.
4. Live acquisitions of VMs are necessary because they include all snapshots.
5. Which hypervisor type can be installed directly on hardware and is limited only
by the amount of available RAM, storage, and throughput?
Type 1 hypervisor
Quick Quiz 2
1. The amount of time that a long a piece of information lasts on a system is known as
order of volatility (OOV).
2. Network forensics is the process of collecting and analyzing raw network data and
systematically tracking network traffic to ascertain how an attack was carried out or
how an event occurred on a network.
3. True or False: Testing networks is not as important as testing servers.
False
4. Packet Analysers are devices and/or software placed on a network to monitor traffic.
5. A(n) Honeypot is a computer set up to look like any other machine on your network;
its purpose is to lure attackers to your network, but the computer contains no
information of real value.
6. Honey walls are computers set up to monitor what’s happening to honeypots on your
network and record what attackers are doing.
Questions and Projects are prepared from Cengage Learning Resource ‘Guide to Computer Forensics and Investigations’. Nelson, B, Phillips, A. &
Steuart, C 2018, Sixth Edition, Cengage Learning US. Mason. OH
ICT741 Tutorial 7 Compiled by: Dr Saeid Iranmanesh Date: 5 July 2021