How do cloud service providers complicate investigating virtual networks?
What will be an ideal response?
ANSWER: Say you’re dealing with a cloud service provider (CSP) that hosts networks for several to hundreds of companies. As stated in the Journal of Cybersecurity article, network forensics investigations in the cloud are hampered by the very qualities that make the cloud appealing—elasticity and flexibility. If needed (and it’s allowed in the service level agreement), a new server can come online to deal with load balancing. In addition, automatic failovers are in place, which may or may not be in the same physical location as the server. Add to that hundreds or even thousands of NICs with the same IP address and MAC address, and you can see that traditional physical network forensics can’t handle these arrangements.
You might also like to view...
General controls for personnel security implement such classic cybersecurity principles as separation of duties, job rotation, and ____.
A. classification B. mandatory vacations C. separation of concerns D. risk mitigation
Which of the following DC voltage levels is produced by a 24-pin ATX power supply? (choose all that apply)
a. +5V b. +3.3V c. +1.35V d. +12V
Users are reporting that a Vista feature asks them for confirmation before running most applications or making system changes. Which of the following is the name of this Vista feature and where should the technician direct users to turn the functionality off?
A. User Account Control; it can be turned off under Security in the Control Panel. B. Security Center; it can be turned off in the Services MMC snap-in. C. User Account Control; it can be turned off under User Accounts in the Control Panel. D. Windows Firewall; it can be turned off under System Properties.
____ is probably the most common form of error control.?
A. ?Toss the frame (do nothing) B. ?Correct the error without retransmission C. ?Sending a message back to the transmitter D. ?Correct the error with retransmission