FORGC1
Quiz
•
Other
•
Professional Development
•
Practice Problem
•
Easy
shyrlyn valdez
Used 3+ times
FREE Resource
Enhance your content in a minute
22 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What field allows analysts to track individual emails through various log entries when investigating IMAP clients that use the Bind operation?
Message ID
MailboxUPN
Mailbox Trace
MessageGUID
Answer explanation
IMAP (and POP3) clients will download individual emails using a Bind operation. This is an advantage, as you can track individual emails by following the "Message ID" field through various log entries.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which PowerShell command would a security admin run to determine whether Exchange mailbox auditing was enabled?
Get-Mailbox –Identity admin
Search-Mailbox [[-Identity] <MailboxIdParameter>]
Search-Mailbox [[-Identity] ]
Get-OrganizationalConfig | Format-List AuditDisabled
Get-OrganizationalConfig | Format-List AuditDisabled
Search-UnifiedAuditLog
Answer explanation
The PowerShell command "Get-OrganizationConfig | Format-List AuditDisabled" will help you confirm that audit logs are not disabled (meaning they are enabled). The double negative can be confusing: false means that auditing is turned on.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What two components are required to make a call to the Graph API and obtain an authorization token?
Tenant ID and authToken
Application ID and client secret
Application ID and client ID
Scope and operation result
Answer explanation
By providing the application ID (ClientID) and the client secret, you can make a call to the Graph API and obtain an authorization token.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is an important consideration for DFIR when investigating incidents involving containers like Kubernetes or Docker?
Containers make it easier to perform forensics due to their lightweight footprint.
Specialized tooling and configurations are not required for full visibility.
All log data may be purged on container exit.
Access to logs must be negotiated with the cloud provider up front.
Answer explanation
Serverless and containers are hot topics. Containers are a great way to sandbox an application, while serverless is an efficient way to run a small amount of code. From a DFIR perspective, they both represent challenges. Containers are likely to purge all log data on exit, while serverless typically runs for a short amount of time, leaving very little in terms of logs.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is the customer responsible for in the shared responsibility model of the cloud, regardless of cloud type?
Responses
Logical and physical network configuration
Physical datacenter
Information and data
Operating system and physical hosts
Answer explanation
Each cloud vendor has a shared responsibility model explaining what they will take care of versus what the customer is expected to handle. Regardless of cloud type, the customer is ultimately responsible for the information and data they put in the cloud.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is an important financial consideration when planning to store disks and snapshots from forensic investigations in the cloud on a long-term basis?
Disks and snapshots have dynamic pricing based on the number of CPUs and the memory of the VM mapping them.
Disks and snapshots have an initial, one-time cost only.
Disk and snapshots accrue cost only when the virtual machine that maps them is running.
Disks and snapshots accrue cost all the time, until they are deleted.
Answer explanation
Clouds use a per-consumption model, which means everything you do has a cost. Disks and snapshots are examples of persistent costs, which accrue constantly until the resource or object is deleted. There are also temporary costs, which accrue only when the resource is running, such as with a virtual machine.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which mailbox action would move an email message to the Recoverable Items folder in Exchange?
SoftDelete
MailItemsAccessed
MoveToDeletedItems
HardDelete
Answer explanation
The SoftDelete action moves messages to the Recoverable Items folder. HardDelete purges items from that folder. MoveToDeletedItems moves them to the Deleted Items folder. MailItemsAccessed shows when items are accessed, not when they are deleted.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
17 questions
M3 Cat B
Quiz
•
Professional Development
20 questions
Wellness Quiz
Quiz
•
Professional Development
18 questions
PK- MOE-July 21
Quiz
•
Professional Development
20 questions
DHTM - CSQM (LO 1 to 4)
Quiz
•
Professional Development
23 questions
Soal Pramuka Penggalang
Quiz
•
Professional Development
20 questions
Disney!
Quiz
•
KG - Professional Dev...
20 questions
RevPaper
Quiz
•
Professional Development
20 questions
AA (Mock 1) - 2023
Quiz
•
Professional Development
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade
Discover more resources for Other
10 questions
How to Email your Teacher
Quiz
•
Professional Development
6 questions
3RD GRADE DECLARATION OF INDEPENDENCE EXIT TICKET
Quiz
•
Professional Development
19 questions
Black History Month Trivia
Quiz
•
6th Grade - Professio...
22 questions
Multiplying Exponents with the Same Base
Quiz
•
9th Grade - Professio...
40 questions
Flags of the World
Quiz
•
KG - Professional Dev...
