Page 24 - CPTE_Prep_Guide_Sample
P. 24

Review Answers

                   1.  A – Section 2 – Port Scanning:  The
                   Identification phase of a cloud forensics
                   investigation involves processing data
                   through manual and automated methods to
                   determine whether or not said data can be
                   used in a legal investigation.
                   2.  C – Section 2 – Port Scanning:  No response.
                   This is often due to a firewalled ports being
                   filtered, or possibly the packets being lost due
                   to network congestion.

                   3.  D – Section 4 – Countermeasures:  Standard
                   Framework – Establishing frameworks of
                   trust on an employee/personnel level.

                   4.  D – Section 4 – Countermeasures:
                   Scrutinizing Information – Identifying which
                   information is sensitive and evaluating its
                   exposure to social engineering and
                   breakdowns in security systems.
                   5.  C – Section 4 – Countermeasures:  Security
                   Protocols – Establishing security protocols,
                   policies, and procedures for handling sensitive
                   information.
                   6.  B – Section 4 – Countermeasures:  Training
                   to Employees – Training employees in security
                   protocols relevant to their position.
                   7.  C – Section 5 – Banner Grabbing:  ID Serve –
                   can be used to identify the make, model and



                                                               429
   19   20   21   22   23   24   25