Module 13 Quiz Flashcards

1
Q

The multitenancy nature of cloud environments means conflicts in privacy laws can occur.

True

False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A(n) CSA or cloud service agreement is a contract between a CSP and the customer that describes what services are being provided and at what level.

True

False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What capabilities should a forensics tool have to acquire data from a cloud?

Examine virtual systems.

Expand and contract data storage capabilities as needed for service changes.

Identify and acquire data from the cloud.

All of the above

A

All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following cloud deployment methods typically offers no security?

Hybrid cloud

Community cloud

Public cloud

Private cloud

A

Private cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A CSP’s incident response team typically consists of system administrators, network administrators, and legal advisors.

True

False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the three levels of cloud services defined by NIST?

OpenStack, FROST, and management plane

SaaS, PaaS, and IaaS

Hybrid, private, and community clouds

CRC, DRAM, and IMAP

A

SaaS, PaaS, and IaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is a mechanism the ECPA describes for the government to get electronic information from a provider?

Search warrants

Subpoenas with prior notice

Court orders

All of the above

A

All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Updates to the EU Data Protection Rules will affect how data is moved during an investigation regardless of location.

True

False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In which cloud service level can customers rent hardware and install whatever OSs and applications they need?

SaaS

HaaS

IaaS

PaaS

A

IaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When should a temporary restraining order be requested for cloud environments?

When a search warrant requires seizing a CSP’s hardware and software used by other parties not involved in the case

When cloud customers need immediate access to their data

When anti-forensics techniques are suspected

To enforce a court order

A

When a search warrant requires seizing a CSP’s hardware and software used by other parties not involved in the case

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Amazon was an early provider of Web-based services that eventually developed into the cloud concept.

True

False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The cloud services Dropbox, Google Drive, and OneDrive have Registry entries.

True

False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Evidence of cloud access found on a smartphone usually means which cloud service level was in use?

HaaS

PaaS

SaaS

IaaS

A

SaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Public cloud services such as Dropbox and OneDrive use Sophos SafeGuard and Sophos Mobile Control as their encryption applications

True

False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

NIST document SP 500-322 defines more than 75 cloud services, including which of the following?

Backup as a service

Security as a service

Drupal as a service

All of the above

A

All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

To see Google Drive synchronization files, you need a SQL viewer.

True

False

A

True

17
Q

Commingled data isn’t a concern when acquiring cloud data.

True

False

A

False

18
Q

What are the two states of encrypted data in a secure cloud?

Homomorphic and AES

RC4 and RC5

Data in motion and data at rest

CRC-32 and UTF-16

A

Data in motion and data at rest