Module 13 Quiz
What are the two states of encrypted data in a secure cloud?
Data in motion and data at rest
Commingled data isn't a concern when acquiring cloud data.
Fasle
In which cloud service level can customers rent hardware and install whatever OSs and applications they need?
IaaS
Which of the following cloud deployment methods typically offers no security?
Public cloud
Evidence of cloud access found on a smartphone usually means which cloud service level was in use?
SaaS
A CSP's incident response team typically consists of system administrators, network administrators, and legal advisors.
True
A(n) CSA or cloud service agreement is a contract between a CSP and the customer that describes what services are being provided and at what level.
True
Public cloud services such as Dropbox and OneDrive use Sophos SafeGuard and Sophos Mobile Control as their encryption applications
True
The cloud services Dropbox, Google Drive, and OneDrive have Registry entries.
True
The multitenancy nature of cloud environments means conflicts in privacy laws can occur.
True
To see Google Drive synchronization files, you need a SQL viewer.
True
Updates to the EU Data Protection Rules will affect how data is moved during an investigation regardless of location.
True
When should a temporary restraining order be requested for cloud environments?
When a search warrant requires seizing a CSP's hardware and software used by other parties not involved in the case
What are the three levels of cloud services defined by NIST?
- Saas - PaaS - IaaS
Amazon was an early provider of Web-based services that eventually developed into the cloud concept.
True
NIST document SP 500-322 defines more than 75 cloud services, including which of the following?
- Backup as a service - Security as a service - Drupal as a service *- All of the above*
Which of the following is a mechanism the ECPA describes for the government to get electronic information from a provider?
- Court orders -Search warrents - Subpoenas with prior notice *- All of the above*
What capabilities should a forensics tool have to acquire data from a cloud?
- examine virtual systems - Expand and contract data storage capabilites as needed for service changes. - Identify and acquire data from the cloud. *- All of the above*