Question: Question 1 5 pts A _ _ _ _ enables you to run another OS on an existing physical computer ( known as the host

Question 15 pts
A ____enables you to run another OS on an existing physical computer (knownas the host computer) by emulating a computer's hardware environment.
Group of answer choices
virtual file
logic drive
logic machine
virtual machine
Flag question: Question 2
Question 25 pts
The file or folder's MFT record provides cluster addresses where the file is stored on the drive's partition. These cluster addresses are called ____.
Group of answer choices
virtual runs
metada
metaruns
data runs
Flag question: Question 3
Question 35 pts
Which of the following components of a hard drive refers to a disks logical structure of platters, tracks and sectors?
Group of answer choices
Geometry
Sectors
Tracks
Heads
Flag question: Question 4
Question 45 pts
Which file system was introduced when Windows NT was created, and is still in use today?
Group of answer choices
OSX
Debian
NTFS
exFAT
Flag question: Question 5
Question 55 pts
It's possible to create a partition, add data to it, and then remove references to the partition so that it can be hidden in Windows.
Group of answer choices
True
False
Flag question: Question 6
Question 65 pts
Which type of log file records events that are related to Windows system components, such as drivers and built-in interface elements?
Group of answer choices
System Log File
Security Log File
Setup Log File
Application Log File
Flag question: Question 7
Question 75 pts
What type of log component indicates the type of audit message an event represents?
Group of answer choices
Event ID
Computer
Keywords
Level
Flag question: Question 8
Question 85 pts
Which type of log file records events that are forwarded by other computers when the local machine is functioning as a central subscriber?
Group of answer choices
Application Log File
Setup Log File
System Log File
Forwarded Events Log File
Flag question: Question 9
Question 95 pts
What type of log component indicates the type of event that generated the log message?
Group of answer choices
Keywords
Event ID
Date/Time
Source
Flag question: Question 10
Question 105 pts
What extension are Windows log files saved as?
Group of answer choices
.dll
.log
.png
.txt
Flag question: Question 11
Question 115 pts
Which of the following HKEYS contains information about installed hardware and software?
Group of answer choices
HKEY_CURRENT_CONFIG
HKEY_LOCAL_MACHINE
HKEY_CURRENT_USER
HKEY_CLASSES_ROOT
Flag question: Question 12
Question 125 pts
Which of the following terms describes folders within the HKEYS that contain values or other key folder information?
Group of answer choices
Hives
Default Value
Value
Key
Flag question: Question 13
Question 135 pts
Which of the following terms is a name within the key; similar to a file and the data content?
Group of answer choices
Handle
Subkey
Branch
Value
Flag question: Question 14
Question 145 pts
A _____________ is a utility for viewing and modifying data in the Registry.
Group of answer choices
Hive
Key
Branch
Registry Editor
Flag question: Question 15
Question 155 pts
Which Windows Registry file stores the user preferences on the computer?
Group of answer choices
SAM
SOFTWARE
SYSTEM
NTUSER.DAT
Flag question: Question 16
Question 165 pts
What type of file system are Alternate Data Streams (ADS) found on?
Group of answer choices
FAT
FAT-32
NTFS
HFS
Flag question: Question 17
Question 175 pts
Which type of files are used in Windows to provide functionality of the application programs?
Group of answer choices
Executable
Database
Command
Dynamic Link Libraries
Flag question: Question 18
Question 185 pts
Which type of file is a repository of information, such as web URLs, search queries and recently opened files?
Group of answer choices
Index.dat
NTUSER.DAT
BOOTSTART.DAT
Settings.dat
Flag question: Question 19
Question 195 pts
Extracting unallocated space data on a hard drive is called ________________________.
Group of answer choices
File Carving
Hard Drive Carving
File Slicing
Hard Drive Slicing
Flag question: Question 20
Question 205 pts
What type of attack is caused by the uploading an unauthorized file, or changing the file extension to .dll?
Group of answer choices
Phishing
SQL Injection
Cross-Site Scripting
.DLL Hijacking

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!