Question: Question 1 5 pts A _ _ _ _ enables you to run another OS on an existing physical computer ( known as the host
Question pts
A enables you to run another OS on an existing physical computer knownas the host computer by emulating a computer's hardware environment.
Group of answer choices
virtual file
logic drive
logic machine
virtual machine
Flag question: Question
Question pts
The file or folder's MFT record provides cluster addresses where the file is stored on the drive's partition. These cluster addresses are called
Group of answer choices
virtual runs
metada
metaruns
data runs
Flag question: Question
Question pts
Which of the following components of a hard drive refers to a disks logical structure of platters, tracks and sectors
Group of answer choices
Geometry
Sectors
Tracks
Heads
Flag question: Question
Question pts
Which file system was introduced when Windows NT was created, and is still in use today?
Group of answer choices
OSX
Debian
NTFS
exFAT
Flag question: Question
Question pts
It's possible to create a partition, add data to it and then remove references to the partition so that it can be hidden in Windows.
Group of answer choices
True
False
Flag question: Question
Question pts
Which type of log file records events that are related to Windows system components, such as drivers and builtin interface elements?
Group of answer choices
System Log File
Security Log File
Setup Log File
Application Log File
Flag question: Question
Question pts
What type of log component indicates the type of audit message an event represents?
Group of answer choices
Event ID
Computer
Keywords
Level
Flag question: Question
Question pts
Which type of log file records events that are forwarded by other computers when the local machine is functioning as a central subscriber?
Group of answer choices
Application Log File
Setup Log File
System Log File
Forwarded Events Log File
Flag question: Question
Question pts
What type of log component indicates the type of event that generated the log message?
Group of answer choices
Keywords
Event ID
DateTime
Source
Flag question: Question
Question pts
What extension are Windows log files saved as
Group of answer choices
dll
log
png
txt
Flag question: Question
Question pts
Which of the following HKEYS contains information about installed hardware and software?
Group of answer choices
HKEYCURRENTCONFIG
HKEYLOCALMACHINE
HKEYCURRENTUSER
HKEYCLASSESROOT
Flag question: Question
Question pts
Which of the following terms describes folders within the HKEYS that contain values or other key folder information?
Group of answer choices
Hives
Default Value
Value
Key
Flag question: Question
Question pts
Which of the following terms is a name within the key; similar to a file and the data content?
Group of answer choices
Handle
Subkey
Branch
Value
Flag question: Question
Question pts
A is a utility for viewing and modifying data in the Registry.
Group of answer choices
Hive
Key
Branch
Registry Editor
Flag question: Question
Question pts
Which Windows Registry file stores the user preferences on the computer?
Group of answer choices
SAM
SOFTWARE
SYSTEM
NTUSER.DAT
Flag question: Question
Question pts
What type of file system are Alternate Data Streams ADS found on
Group of answer choices
FAT
FAT
NTFS
HFS
Flag question: Question
Question pts
Which type of files are used in Windows to provide functionality of the application programs?
Group of answer choices
Executable
Database
Command
Dynamic Link Libraries
Flag question: Question
Question pts
Which type of file is a repository of information, such as web URLs, search queries and recently opened files?
Group of answer choices
Index.dat
NTUSER.DAT
BOOTSTART.DAT
Settings.dat
Flag question: Question
Question pts
Extracting unallocated space data on a hard drive is called
Group of answer choices
File Carving
Hard Drive Carving
File Slicing
Hard Drive Slicing
Flag question: Question
Question pts
What type of attack is caused by the uploading an unauthorized file, or changing the file extension to dll
Group of answer choices
Phishing
SQL Injection
CrossSite Scripting
DLL Hijacking
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
