Racks of servers in a data center pooled into multiple virtual servers is called a: Correct Answer: Cloud
When seizing a mobile phone, which of the following can compromise a case if forgotten? Correct
Answer: All of the above.
When an investigator finds illegal or illicit material on a BYOD device, he must thoroughly understand
the device's settings in order to accurately report and defend examination findings. Correct Answer:
True
Which of the following present forensic problems with cloud computing? Correct Answer: All of the
above.
As long as there is reasonable suspicion, law enforcement may obtain digital artifacts from cloud servers
without a warrant. A forensic professional who believes that evidence will be destroyed unless the
evidence is immediately seized can seize the evidence prior to obtaining a warrant. Correct Answer:
False
Which of the following is an example of a mixed-use BYOD policy? Correct Answer: Employees who
work most extensively away from their desks should receive subsidies for most or all of the personal
device charges. (?)
A password phrase is an example of a knowledge factor used for authentication. Correct Answer: True
The physical approach for data extraction performs the extraction with the help of specialized hardware
equipment allowing the contents of the entire phone memory to be extracted. Correct Answer: True
The infrastructure and platforms on which virtual applications run are managed by: Correct Answer:
RAM
Gaming consoles can provide a platform for terrorists to communicate with each other. Correct Answer:
True
Which statement BEST represents what an employer can do with a good Employment Agreement and a
BYOD operating policy in place, signed by the employee? Correct Answer: All of the above.
The iPhone Operating System is comprised of which four layers: Correct Answer: Core Operating
System, Core Services, Media and Cocoa Touch.
The procedure framework for search and seizure process for cloud computing is 1) acquisition, 2)
authentication, and 3) analysis. Correct Answer: True
When a Cloud Service Provider executes a warrant and gathers the data requested, the data is validated
by what? Correct Answer: Cryptographic check sums