1/20
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Amazon was an early provider of web-based services that eventually developed into the cloud concept. True or False?
a. True
b. False
a. True
What are the three levels of cloud services defined by NIST?
a. CRC, DRAM, and IMAP
b. OpenStack, FROST, and management plane
c. SaaS, PaaS, and IaaS
d. Hybrid, private, and community clouds
c. SaaS, PaaS, and IaaS
What capabilities should a forensics tool have to acquire data from a cloud? (Choose all that apply.)
a. Identify and acquire data from the cloud.
b. Expand and contract data storage capabilities as needed for service changes.
c. Circumvent firewalls to access cloud data.
d. Examine virtual systems.
a. Identify and acquire data from the cloud.
b. Expand and contract data storage capabilities as needed for service changes.
d. Examine virtual systems.
Commingled data isn't a concern when acquiring cloud data. True or False?
a. True
b. False
b. False
Which of the following is a mechanism the ECPA describes for the government to get electronic information from a provider? (Choose all that apply.)
a. Subpoenas with prior notice
b. Temporary restraining orders
c. Search warrants
d. Court orders
a. Subpoenas with prior notice
c. Search warrants
d. Court orders
In which cloud service level can customers rent hardware and install whatever OSs and applications they need?
a. SaaS
b. IaaS
c. DaaS
d. PaaS
b. IaaS
What are the two states of encrypted data in a secure cloud?
a. RC4 and RC5
b. CRC-32 and UTF-16
c. Homomorphic and AES
d. Data in motion and data at rest
d. Data in motion and data at rest
Evidence of cloud access found on a smartphone usually means which cloud service level was in use?
a. IaaS
b. HaaS
c. PaaS
d. SaaS
d. SaaS
Which of the following cloud deployment methods typically offers the best security?
a. Hybrid cloud
b. Public cloud
c. Community cloud
d. Private cloud
b. Public cloud
The multi-tenancy nature of cloud environments means conflicts in privacy laws can occur. True or False?
a. True
b. False
a. True
Which of the following tools are commonly used to obtain data in the cloud?
a. X-Ways Forensics
b. F-Response Universal
c. FTK Imager
d. RFID
b. F-Response Universal
The cloud services Dropbox, Google Drive, and OneDrive have Registry entries. True or False?
a. True
b. False
a. True
When might a temporary restraining order be requested for cloud environments?
a. When cloud customers need immediate access to their data
b. To enforce a court order
c. When anti-forensics techniques are suspected
d. When a search warrant requires seizing a CSP's hardware and software used by other parties not involved in the case
d. When a search warrant requires seizing a CSP's hardware and software used by other parties not involved in the case
NIST document SP 500-322 defines more than 75 cloud services, including which of the following? (Choose all that apply.)
a. Backup as a service
b. Security as a service
c. Drupal as a service
d. Intelligence as a service
a. Backup as a service
b. Security as a service
c. Drupal as a service
What is included in the Internet of Everything as it was defined by Cisco Systems?
a. All things on the Internet
b. The people, data, devices, and processes connected via the Internet
c. The future of things on the Internet
d. The work of hackers on the Internet
b. The people, data, devices, and processes connected via the Internet
Machine-to-machine (M2M) connections need human approval to operate. True or False?
a. True
b. False
b. False
In a smart home, everyday appliances that can be accessed via your smartphone could include which of the following?
a. Washing machine
b. Dishwasher
c. Refrigerator
d. All of these choices
d. All of these choices
Hackers could potentially use smart light bulb data on an unsecure wireless network to do which of the following? (Choose all that apply.)
a. Determine your everyday habits.
b. Ascertain the layout of your home.
c. Determine if you are away from home.
d. None of these choices
a. Determine your everyday habits.
b. Ascertain the layout of your home.
c. Determine if you are away from home.
The data from items such as a CPAP machine store information that is subject to which of the following laws?
a. Sarbanes-Oxley
b. PCI DSS
c. HIPAA
d. None of these choices
c. HIPAA
Which of the following IoT categories covers technologies used for traffic control, energy, water and waste management, and public safety?
a. Industrial Internet of Things
b. Infrastructure Internet of Things
c. Commercial Internet of Things
d. None of these choices
b. Infrastructure Internet of Things
Which of the following is a device that allows data to be processed as close to the source as possible?
a. Magnet AXIOM Cloud
b. CGM device
c. OneDrive
d. IoT edge device
d. IoT edge device