CSNT 280, Chapter 13 Review Quiz
A search warrant can be used in any kind of case, either civil or criminal. True False
False
The law requires search warrants to contain specific descriptions of what's to be seized. For cloud environments, the property to be seized usually describes physical hardware rather than data, unless the CSP is a suspect. True False
False
What information below is not something recorded in Google Drive's snapshot.db file? file access records URL pathnames modified and created times file SHA values and sizes
file SHA values and sizes
To reduce the time it takes to start applications, Microsoft has created __________ files, which contain the DLL pathnames and metadata used by applications. cache prefetch config temp
prefetch
With cloud systems running in a virtual environment, _______________ can give you valuable information before, during, and after an incident. RAM snapshot live acquisition carving
snapshot
Which of the following is not a valid source for cloud forensics training? (ISC)2 Certified Cyber Forensics Professional INFOSEC Intitute Sans Cloud Forensics with F-Response A+ Security
A+ Security
Select the folder below that is most likely to contain Dropbox files for a specific user: C:\Dropbox C:\Users\username\Dropbox C:\Users\Dropbox C:\Users\username\AppData\Dropbox
C:\Users\username\Dropbox
Where is the snapshot database created by Google Drive located in Windows? C:\Program Files\Google\Drive C:\Users\username\AppData\Local\\Google\Drive C:\Users\username\Google\Google Drive C:\Google\Drive
C:\Users\username\AppData\Local\\Google\Drive
The __________________________ is an organization that has developed resource documentation for CSPs and their staff. It provides guidance for privacy agreements, security measures, questionnaires, and more. OpenStack Framework Alliance Cloud Security Alliance Cloud Architecture Group vCloud Security Advisory Panel
Cloud Security Alliance
Which of the following is NOT a service level for the cloud? Software as a service Virtualization as a service Platform as a service Infrastructure as a service
Virtualization as a service
The __________________ Dropbox file stores information on shared directories associated with a Dropbox user account and file transfers between Dropbox and the client's system. filecache.dbx read_filejournal filetx.log filecache.dll
filecache.dbx
A _________________ is a tool with application programming interfaces (APIs) that allow reconfiguring a cloud on the fly; it's accessed through the application's Web interface. programming language management plane backdoor configuration manager
management plane
Which of the following is not one of the five mechanisms the government can use to get electronic information from a provider? search warrants subpoenas court orders seizure order
seizure order
The Google drive file _________________ contains a detailed list of a user's cloud transactions. loggedtransactions.log sync_log.log transact_user.db history.db
sync_log.log
Which is not a valid method of deployment for a cloud? public private community targeted
targeted
What cloud application offers a variety of cloud services, including automation and CRM, cloud application development, and Web site marketing? IBM Cloud Amazon EC2 Salesforce HP Helion
Salesforce
In the United States, the Electronic Communications Privacy Act (ECPA) describes 5 mechanisms the government can use to get electronic information from a provider. True False
True
Specially trained system and network administrators are often a CSP's first responders. True False
True
The Internet is the successor to the Advanced Research Projects Agency Network (ARPANET). True False
True
A ________________ is written by a judge to compel someone to do or not do something, such as a CSP producing user logon activities. court order subpoena warrant temporary restraining order
court order
