Filters
Question type

Study Flashcards

Math each item with a statement below -A principle of software architecture in which a single installation of a program runs on a server accessed by multiple entities (tenants) . when software is access by tenants in multiple jurisdictions, conflicts in copyright and licensing laws might result.?


A) cloud service providers (CSPs)
B) community cloud
C) deprovisioning
D) hybrid cloud
E) infrastructure as a service (IaaS)
F) multitenancy
G) private cloud
H) provisioning
I) public cloud
J) spoliation

K) C) and J)
L) D) and H)

Correct Answer

verifed

verified

The law requires search warrants to contain specific descriptions of what's to be seized. For cloud environments, the property to be seized usually describes physical hardware rather than data, unless the CSP is a suspect.

A) True
B) False

Correct Answer

verifed

verified

Explain what "anti-forensics" is, and provide detail on some anti-forensics tactics.

Correct Answer

verifed

verified

Destroying ESI that's potential evidence...

View Answer

To reduce the time it takes to start applications, Microsoft has created __________ files, which contain the DLL pathnames and metadata used by applications.​


A) cache​
B) ​prefetch
C) config
D) temp

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

In a prefetch file, the application's last access date and time are at offset _______________.​


A) ​0x80
B) ​0x88
C) 0x90
D) 0xD4

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Which of the following is NOT a service level for the cloud?​ ​


A) ​Software as a service
B) ​Virtualization as a service
C) Platform as a service
D) Infrastructure as a service

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Describe how the Forensic Open-Stack Tools (FROST) bypasses a virtual machine's hypervisor.​

Correct Answer

verifed

verified

With FROST, collected data is placed in ...

View Answer

The ________________ script converts Dropbox's config.db into a readable text file.?

Correct Answer

verifed

verified

What capabilities should a forensic tool have to handle acquiring data from the cloud?

Correct Answer

verifed

verified

Tools must be able to identify, label, r...

View Answer

Math each item with a statement below -Allocating cloud resources, such as additional disk space.?


A) cloud service providers (CSPs)
B) community cloud
C) deprovisioning
D) hybrid cloud
E) infrastructure as a service (IaaS)
F) multitenancy
G) private cloud
H) provisioning
I) public cloud
J) spoliation

K) C) and E)
L) C) and D)

Correct Answer

verifed

verified

Where is the snapshot database created by Google Drive located in Windows?​


A) ​C: \Program Files\Google\Drive
B) ​C: \ Users\​username​\AppData\Local\\Google\Drive
C) C: \ Users\​username​\Google\Google Drive
D) C: \Google\Drive

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Which of the following is not a valid source for cloud forensics training??


A) ?(ISC) 2Certified Cyber Forensics Professional
B) ?INFOSEC Intitute
C) Sans Cloud Forensics with F-Response
D) A+ Security

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

Math each item with a statement below -?With this cloud service level, an organization supplies its own OS, applications, databases, and operations staff, and the cloud provider is responsible only for selling or leasing the hardware.


A) cloud service providers (CSPs)
B) community cloud
C) deprovisioning
D) hybrid cloud
E) infrastructure as a service (IaaS)
F) multitenancy
G) private cloud
H) provisioning
I) public cloud
J) spoliation

K) B) and F)
L) E) and J)

Correct Answer

verifed

verified

Math each item with a statement below -?Vendors that provide on-demand network access to a shared pool of resources (typically remote data storage or Web applications)


A) cloud service providers (CSPs)
B) community cloud
C) deprovisioning
D) hybrid cloud
E) infrastructure as a service (IaaS)
F) multitenancy
G) private cloud
H) provisioning
I) public cloud
J) spoliation

K) E) and I)
L) A) and I)

Correct Answer

verifed

verified

The __________________ Dropbox file stores information on shared directories associated with a Dropbox user account and file transfers between Dropbox and the client's system.​


A) ​filecache.dbx
B) ​read_filejournal
C) filetx.log
D) filecache.dll

E) All of the above
F) None of the above

Correct Answer

verifed

verified

What cloud application offers a variety of cloud services, including automation and CRM, cloud application development, and Web site marketing?​


A) IBM Cloud​
B) ​Amazon EC2
C) Salesforce
D) HP Helion

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

Explain what a service level agreement is.

Correct Answer

verifed

verified

Organizations that sell cloud services h...

View Answer

Describe the role of incident first responders, and discuss some factors that should be addressed with first responders.

Correct Answer

verifed

verified

Typically, CSPs have personnel trained t...

View Answer

Math each item with a statement below -A cloud service dedicated to a single organization.?


A) cloud service providers (CSPs)
B) community cloud
C) deprovisioning
D) hybrid cloud
E) infrastructure as a service (IaaS)
F) multitenancy
G) private cloud
H) provisioning
I) public cloud
J) spoliation

K) C) and D)
L) A) and B)

Correct Answer

verifed

verified

?With cloud systems running in a virtual environment, _______________ can give you valuable information before, during, and after an incident.


A) ?RAM
B) ?snapshot
C) live acquisition
D) carving

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

Showing 21 - 40 of 49

Related Exams

Show Answer