Exam 13: Cell Phone and Mobile Device Forensics

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The ________________ script converts Dropbox's config.db into a readable text file.?

(Short Answer)
4.8/5
(40)

The law requires search warrants to contain specific descriptions of what's to be seized. For cloud environments, the property to be seized usually describes physical hardware rather than data, unless the CSP is a suspect.

(True/False)
4.8/5
(39)

Math each item with a statement below -A principle of software architecture in which a single installation of a program runs on a server accessed by multiple entities (tenants). when software is access by tenants in multiple jurisdictions, conflicts in copyright and licensing laws might result.?

(Multiple Choice)
4.9/5
(35)

Math each item with a statement below -?With this cloud service level, an organization supplies its own OS, applications, databases, and operations staff, and the cloud provider is responsible only for selling or leasing the hardware.

(Multiple Choice)
4.9/5
(25)

Explain what "anti-forensics" is, and provide detail on some anti-forensics tactics.

(Essay)
4.7/5
(35)

Which of the following is NOT a service level for the cloud?​ ​

(Multiple Choice)
4.7/5
(32)

Explain what a service level agreement is.

(Essay)
4.8/5
(29)

What cloud application offers a variety of cloud services, including automation and CRM, cloud application development, and Web site marketing?​

(Multiple Choice)
4.9/5
(39)

To reduce the time it takes to start applications, Microsoft has created __________ files, which contain the DLL pathnames and metadata used by applications.​

(Multiple Choice)
4.8/5
(27)

?With cloud systems running in a virtual environment, _______________ can give you valuable information before, during, and after an incident.

(Multiple Choice)
4.9/5
(41)

Which of the following is not a valid source for cloud forensics training??

(Multiple Choice)
4.8/5
(29)

The __________________ Dropbox file stores information on shared directories associated with a Dropbox user account and file transfers between Dropbox and the client's system.​

(Multiple Choice)
4.9/5
(43)

Math each item with a statement below -?Vendors that provide on-demand network access to a shared pool of resources (typically remote data storage or Web applications)

(Multiple Choice)
4.9/5
(32)

Describe the role of incident first responders, and discuss some factors that should be addressed with first responders.

(Essay)
4.8/5
(34)

What capabilities should a forensic tool have to handle acquiring data from the cloud?

(Essay)
4.7/5
(38)

In a prefetch file, the application's last access date and time are at offset _______________.​

(Multiple Choice)
4.8/5
(35)

Describe how the Forensic Open-Stack Tools (FROST) bypasses a virtual machine's hypervisor.​

(Essay)
4.8/5
(41)

Math each item with a statement below -A cloud service dedicated to a single organization.?

(Multiple Choice)
4.7/5
(43)

Where is the snapshot database created by Google Drive located in Windows?​

(Multiple Choice)
4.8/5
(32)

Math each item with a statement below -Allocating cloud resources, such as additional disk space.?

(Multiple Choice)
4.9/5
(37)
Showing 21 - 40 of 49
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)