Module 13 Quiz

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What are the two states of encrypted data in a secure cloud?

Data in motion and data at rest

Commingled data isn't a concern when acquiring cloud data.

Fasle

In which cloud service level can customers rent hardware and install whatever OSs and applications they need?

IaaS

Which of the following cloud deployment methods typically offers no security?

Public cloud

Evidence of cloud access found on a smartphone usually means which cloud service level was in use?

SaaS

A CSP's incident response team typically consists of system administrators, network administrators, and legal advisors.

True

A(n) CSA or cloud service agreement is a contract between a CSP and the customer that describes what services are being provided and at what level.

True

Public cloud services such as Dropbox and OneDrive use Sophos SafeGuard and Sophos Mobile Control as their encryption applications

True

The cloud services Dropbox, Google Drive, and OneDrive have Registry entries.

True

The multitenancy nature of cloud environments means conflicts in privacy laws can occur.

True

To see Google Drive synchronization files, you need a SQL viewer.

True

Updates to the EU Data Protection Rules will affect how data is moved during an investigation regardless of location.

True

When should a temporary restraining order be requested for cloud environments?

When a search warrant requires seizing a CSP's hardware and software used by other parties not involved in the case

What are the three levels of cloud services defined by NIST?

- Saas - PaaS - IaaS

Amazon was an early provider of Web-based services that eventually developed into the cloud concept.

True

NIST document SP 500-322 defines more than 75 cloud services, including which of the following?

- Backup as a service - Security as a service - Drupal as a service *- All of the above*

Which of the following is a mechanism the ECPA describes for the government to get electronic information from a provider?

- Court orders -Search warrents - Subpoenas with prior notice *- All of the above*

What capabilities should a forensics tool have to acquire data from a cloud?

- examine virtual systems - Expand and contract data storage capabilites as needed for service changes. - Identify and acquire data from the cloud. *- All of the above*


Set pelajaran terkait

Chapter 7 A&P in class assignment

View Set

Chapter 10 Understanding Work Teams

View Set

Test 2 Fundamentals of Marketing and Technology

View Set

Porth's CH 40 Disorders of Acid-Base Balance

View Set

Chapter 54: Drugs Acting on the Upper Respiratory Tract

View Set

Ch. 9- Wisdom and Courage: Characteristics of the Wise and the Brave

View Set

Pearson Capacitance and Capacitors

View Set