Varsha T2 2021: ICT741 Digital Forensics Tutorial 7
Varsha T2 2021: ICT741 Digital Forensics Tutorial 7
Tutorial 7
Questions and Projects are prepared from Cengage Learning Resource ‘Guide to Computer Forensics and Investigations’. Nelson, B, Phillips, A. &
Steuart, C 2018, Sixth Edition, Cengage Learning US. Mason. OH
Questions and Projects are prepared from Cengage Learning Resource ‘Guide to Computer Forensics and Investigations’. Nelson, B, Phillips, A. &
Steuart, C 2018, Sixth Edition, Cengage Learning US. Mason. OH
2. True or False: Instruction sets called Virtual Machine Extensions (VMX) are
necessary to use virtualization; without these instruction sets, virtualization
software doesn’t work.
True
3. By linking a VM’s IP address to log files, you might be able to determine what Web
sites the VM accessed.
4. Live acquisitions of VMs are necessary because they include all snapshots.
5. Which hypervisor type can be installed directly on hardware and is limited only
by the amount of available RAM, storage, and throughput?
Type 1 hypervisor
Quick Quiz 2
1. The amount of time that a long a piece of information lasts on a system is known as
order of volatility (OOV).
2. Network forensics is the process of collecting and analyzing raw network data and
systematically tracking network traffic to ascertain how an attack was carried out or
how an event occurred on a network.
4. Packet Analysers are devices and/or software placed on a network to monitor traffic.
5. A(n) Honeypot is a computer set up to look like any other machine on your network;
its purpose is to lure attackers to your network, but the computer contains no
information of real value.
6. Honey walls are computers set up to monitor what’s happening to honeypots on your
network and record what attackers are doing.
Questions and Projects are prepared from Cengage Learning Resource ‘Guide to Computer Forensics and Investigations’. Nelson, B, Phillips, A. &
Steuart, C 2018, Sixth Edition, Cengage Learning US. Mason. OH