Quiz: Module 11 Cloud Forensics and the Internet of Anything

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/20

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

21 Terms

1
New cards

Amazon was an early provider of web-based services that eventually developed into the cloud concept. True or False?

a. True

b. False

a. True

2
New cards

What are the three levels of cloud services defined by NIST?

a. CRC, DRAM, and IMAP

b. OpenStack, FROST, and management plane

c. SaaS, PaaS, and IaaS

d. Hybrid, private, and community clouds

c. SaaS, PaaS, and IaaS

3
New cards

What capabilities should a forensics tool have to acquire data from a cloud? (Choose all that apply.)

a. Identify and acquire data from the cloud.

b. Expand and contract data storage capabilities as needed for service changes.

c. Circumvent firewalls to access cloud data.

d. Examine virtual systems.

a. Identify and acquire data from the cloud.

b. Expand and contract data storage capabilities as needed for service changes.

d. Examine virtual systems.

4
New cards

Commingled data isn't a concern when acquiring cloud data. True or False?

a. True

b. False

b. False

5
New cards

Which of the following is a mechanism the ECPA describes for the government to get electronic information from a provider? (Choose all that apply.)

a. Subpoenas with prior notice

b. Temporary restraining orders

c. Search warrants

d. Court orders

a. Subpoenas with prior notice

c. Search warrants

d. Court orders

6
New cards

In which cloud service level can customers rent hardware and install whatever OSs and applications they need?

a. SaaS

b. IaaS

c. DaaS

d. PaaS

b. IaaS

7
New cards

What are the two states of encrypted data in a secure cloud?

a. RC4 and RC5

b. CRC-32 and UTF-16

c. Homomorphic and AES

d. Data in motion and data at rest

d. Data in motion and data at rest

8
New cards

Evidence of cloud access found on a smartphone usually means which cloud service level was in use?

a. IaaS

b. HaaS

c. PaaS

d. SaaS

d. SaaS

9
New cards

Which of the following cloud deployment methods typically offers the best security?

a. Hybrid cloud

b. Public cloud

c. Community cloud

d. Private cloud

b. Public cloud

10
New cards

The multi-tenancy nature of cloud environments means conflicts in privacy laws can occur. True or False?

a. True

b. False

a. True

11
New cards

Which of the following tools are commonly used to obtain data in the cloud?

a. X-Ways Forensics

b. F-Response Universal

c. FTK Imager

d. RFID

b. F-Response Universal

12
New cards

The cloud services Dropbox, Google Drive, and OneDrive have Registry entries. True or False?

a. True

b. False

a. True

13
New cards

When might a temporary restraining order be requested for cloud environments?

a. When cloud customers need immediate access to their data

b. To enforce a court order

c. When anti-forensics techniques are suspected

d. When a search warrant requires seizing a CSP's hardware and software used by other parties not involved in the case

d. When a search warrant requires seizing a CSP's hardware and software used by other parties not involved in the case

14
New cards

NIST document SP 500-322 defines more than 75 cloud services, including which of the following? (Choose all that apply.)

a. Backup as a service

b. Security as a service

c. Drupal as a service

d. Intelligence as a service

a. Backup as a service

b. Security as a service

c. Drupal as a service

15
New cards

What is included in the Internet of Everything as it was defined by Cisco Systems?

a. All things on the Internet

b. The people, data, devices, and processes connected via the Internet

c. The future of things on the Internet

d. The work of hackers on the Internet

b. The people, data, devices, and processes connected via the Internet

16
New cards

Machine-to-machine (M2M) connections need human approval to operate. True or False?

a. True

b. False

b. False

17
New cards

In a smart home, everyday appliances that can be accessed via your smartphone could include which of the following?

a. Washing machine

b. Dishwasher

c. Refrigerator

d. All of these choices

d. All of these choices

18
New cards

Hackers could potentially use smart light bulb data on an unsecure wireless network to do which of the following? (Choose all that apply.)

a. Determine your everyday habits.

b. Ascertain the layout of your home.

c. Determine if you are away from home.

d. None of these choices

a. Determine your everyday habits.

b. Ascertain the layout of your home.

c. Determine if you are away from home.

19
New cards

The data from items such as a CPAP machine store information that is subject to which of the following laws?

a. Sarbanes-Oxley

b. PCI DSS

c. HIPAA

d. None of these choices

c. HIPAA

20
New cards

Which of the following IoT categories covers technologies used for traffic control, energy, water and waste management, and public safety?

a. Industrial Internet of Things

b. Infrastructure Internet of Things

c. Commercial Internet of Things

d. None of these choices

b. Infrastructure Internet of Things

21
New cards

Which of the following is a device that allows data to be processed as close to the source as possible?

a. Magnet AXIOM Cloud

b. CGM device

c. OneDrive

d. IoT edge device

d. IoT edge device