Chapter 13 ITSY2443 Forensics

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

The ____ is an organization that has developed resource documentation for CSPs and their staff. It provides guidance for privacy agreements, security measures, questionnaires, and more.

Cloud Security Alliance

Specially trained system and network administrators are often a CSP's first responders.​

True

Cloud Service Providers have incident response teams that consist of all of the following, EXCEPT:

backup operators

All of the following pose challenges to cloud computing, EXCEPT:

cloud uptime

Which of the following contain metadata on the last date and time an application was run and how many times it has run since being installed?

prefetch files

To get a ____, a government entity must show that there's probable cause to believe the contents of a wire communication, an electronic communication, or other records are relevant to an ongoing criminal investigation.

search warrant

Remote acquisitions are often easier because you're usually dealing with large volumes of data.

False

Metadata in a prefetch file contains an application's ____ times in UTC format and a counter of how many times the application has run since the prefect file was created.

MAC

Microsoft created SkyDrive as a cloud service that later became?

OneDrive

Which of the following is not one of the five mechanisms the government can use to get electronic information from a provider?

Seizure order

In 1999, Salesforce.com developed a customer relationship management (CRM) Web service that applied digital marketing research to business subscribers so that they could do their own market analysis; this service eventually led the way to the cloud.

True

The Internet is the successor to the Advanced Research Projects Agency Network (ARPANET).

True

Which of the following is NOT a service level for the cloud?

Virtualization as a service

All of the following are considered cloud service levels, EXCEPT:

computer as a service

All of the following are mechanisms that are used to collect digital evidence under the U.S. Electronic Communications Privacy Act (ECPA), EXCEPT:

subpoenas without prior notice to the subscriber or customer


Set pelajaran terkait

Central and peripheral nervous system

View Set

Excel Module 3 for Intro to Computers4

View Set

Consumer Behavior Chapter 3 Practice

View Set