Chapter 13 - Cloud Forensics
All of the following are mechanisms that are used to collect digital evidence under the U.S. Electronic Communications Privacy Act (ECPA), EXCEPT:
Are: search warrants subpoenas subpoenas with prior notice to the subscriber or customer court orders court orders with prior notice to the subscriber or customer. Are NOT: subpoenas WITHOUT prior notice to the subscriber or customer
All of the following are considered cloud service levels, EXCEPT:
Are: software as a service (SaaS) platform as a service (PaaS) infrastructure as a service (IaaS) Are NOT: computer as a service
All of the following pose challenges to cloud computing, EXCEPT:
Challenges: cloud architecture data collection analysis of cloud forensic data anti-forensics incident first responders role management legal issues standards and training NOT challenges: cloud uptime
Cloud Service Providers have incident response teams that consist of all of the following, EXCEPT:
Have: system administrators network administrators legal advisors DON'T have: backup operators
Which of the following contain metadata on the last date and time an application was run and how many times it has run since being installed?
Prefetch files (requires a hex editor/forensics tool to interpret metadata)