Exam 13: Cell Phone and Mobile Device Forensics

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The ______________ tool can be used to bypass a virtual machine's hypervisor, and can be used with OpenStack.

Free
(Multiple Choice)
4.8/5
(38)
Correct Answer:
Verified

B

In the United States, the Electronic Communications Privacy Act (ECPA) describes 5 mechanisms the government can use to get electronic information from a provider.​

Free
(True/False)
4.8/5
(35)
Correct Answer:
Verified

True

What information below is not something recorded in Google Drive's snapshot.db file?​

Free
(Multiple Choice)
4.7/5
(36)
Correct Answer:
Verified

D

Specially trained system and network administrators are often a CSP's first responders.​

(True/False)
4.8/5
(35)

The __________________ file contains cid (client ID), clientType, clientVersion, device, deviceID, and timeUtc values relevant to OneDrive.

(Short Answer)
4.8/5
(39)

What cloud service listed below provides a freeware type 1 hypervisor used for public and private clouds?​

(Multiple Choice)
4.8/5
(44)

Math each item with a statement below -Destroying, altering, hiding, or failing to preserve evidence, whether it's intentional or a result of negligence.?

(Multiple Choice)
4.9/5
(32)

Metadata in a prefetch file contains an application's _____________ times in UTC format and a counter of how many times the application has run since the prefect file was created.​

(Multiple Choice)
4.7/5
(32)

​At what offset is a prefetch file's create date & time located?

(Multiple Choice)
5.0/5
(41)

The __________________________ is an organization that has developed resource documentation for CSPs and their staff. It provides guidance for privacy agreements, security measures, questionnaires, and more.​

(Multiple Choice)
4.8/5
(34)

Explain what a court order is, and describe how it is used.

(Essay)
4.8/5
(40)

Explain why digital forensics examiners should be most concerned with restrictions applied to customers and security measures.​

(Essay)
4.8/5
(37)

Which is not a valid method of deployment for a cloud?​

(Multiple Choice)
4.8/5
(32)

Math each item with a statement below -A shared cloud service that provides access to common or shared data.?

(Multiple Choice)
4.9/5
(31)

Which of the following is not one of the five mechanisms the government can use to get electronic information from a provider?​

(Multiple Choice)
4.9/5
(42)

Math each item with a statement below -Deallocating cloud resources that were assigned to a user or an organization.?

(Multiple Choice)
4.7/5
(37)

A search warrant can be used in any kind of case, either civil or criminal.​

(True/False)
4.9/5
(34)

A _____________ is a contract between a CSP and a customer that describes what services are being provided and at what level.​

(Short Answer)
4.7/5
(38)

The Google drive file _________________ contains a detailed list of a user's cloud transactions.​

(Multiple Choice)
4.9/5
(45)

A _________________ is a tool with application programming interfaces (APIs) that allow reconfiguring a cloud on the fly; it's accessed through the application's Web interface.​

(Multiple Choice)
4.9/5
(30)
Showing 1 - 20 of 49
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)