Chapter 13 Homework Which of the following is a mechanism the ECPA describes

subject Type Homework Help
subject Pages 3
subject Words 755
subject Authors Amelia Phillips, Bill Nelson, Christopher Steuart

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Guide to Computer Forensics and Investigations, 5th ed., 9781285060033
Ch. 13 Solutions-1
Chapter 13 Solutions
Review Questions
1. Amazon was an early provider of Web-based services that eventually developed into the cloud
concept. True or False?
2. What are the three levels of cloud services defined by NIST?
3. What capabilities should a forensics tool have to acquire data from a cloud? (Choose all that apply.)
4. Commingled data isn’t a concern when acquiring cloud data. True or False?
5. A(n) ________________________ is a contract between a CSP and the customer that describes what
services are being provided and at what level.
6. Which of the following is a mechanism the ECPA describes for the government to get electronic
information from a provider? (Choose all that apply.)
7. In which cloud service level can customers rent hardware and install whatever OSs and applications
they need?
8. What are the two states of encrypted data in a secure cloud?
9. Evidence of cloud access found on a smartphone usually means which cloud service level was in
use?
10. Which of the following cloud deployment methods typically offers no security?
11. The multitenancy nature of cloud environments means conflicts in privacy laws can occur. True or
False?
12. To see Google Drive synchronization files, you need a SQL viewer. True or False?
13. A CSP’s incident response team typically consists of which staff?
page-pf2
Guide to Computer Forensics and Investigations, 5th ed., 9781285060033
Ch. 13 Solutions-2
14. Any text editor can be used to read Dropbox files. True or False?
15. When should a temporary restraining order be requested for cloud environments?
Hands-On Projects
Hands-On Project 13-1
Hands-On Project 13-2
Students should have found the UNIX modified date and time of 1406307808, which converts to Fri Jul 25 2014
10:03:28 GMT-0700 (Pacific daylight time), and the UNIX create date and time of 1406307808, which converts to
Hands-On Project 13-3
Hands-On Project 13-4
Case Projects
Case Project 13-1
Students should find Australian government Web sites that explain APP 8 (www.oaic.gov.au/privacy/applying-
Case Project 13-2
Students’ paper should list URLs as references and describe Web sites’ features. Here are some useful links:
page-pf3
Guide to Computer Forensics and Investigations, 5th ed., 9781285060033
Ch. 13 Solutions-3
Case Project 13-3
Students should use the questions listed in “Investigating CSPsand develop additional questions they think are
useful, such as the following:
o Does the CSP allow access to the site where servers and data storage are located?
Case Project 13-4

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.