In this scenario, when should the investigators ensure that a forensic instance is in the terminated state?

TetraSoft Pvt. Ltd. is an IT company that provides software and application services to numerous customers across the globe. In 2015, the organization migrated its applications and data from on-premises to the AWS cloud environment. The cloud security team of TetraSoft Pvt. Ltd. suspected that the EC2 instance that launched...

August 3, 2024No CommentsREAD MORE +

Which cloud service model should it consider?

A BPO company would like to expand its business and provide 24 x 7 customer service. Therefore, the organization wants to migrate to a fully functional cloud environment that provides all features with minimum maintenance and administration. Which cloud service model should it consider?A . laaSB . PaaSC . RaaSD...

August 3, 2024No CommentsREAD MORE +

Identify the next step in the investigation of the security incident in Azure?

An IT company uses two resource groups, named Production-group and Security-group, under the same subscription ID. Under the Production-group, a VM called Ubuntu18 is suspected to be compromised. As a forensic investigator, you need to take a snapshot (ubuntudisksnap) of the OS disk of the suspect virtual machine Ubuntu18 for...

August 3, 2024No CommentsREAD MORE +

Identify the next step in the investigation of the security incident in Azure?

An IT company uses two resource groups, named Production-group and Security-group, under the same subscription ID. Under the Production-group, a VM called Ubuntu18 is suspected to be compromised. As a forensic investigator, you need to take a snapshot (ubuntudisksnap) of the OS disk of the suspect virtual machine Ubuntu18 for...

August 3, 2024No CommentsREAD MORE +

Identify the next step in the investigation of the security incident in Azure?

An IT company uses two resource groups, named Production-group and Security-group, under the same subscription ID. Under the Production-group, a VM called Ubuntu18 is suspected to be compromised. As a forensic investigator, you need to take a snapshot (ubuntudisksnap) of the OS disk of the suspect virtual machine Ubuntu18 for...

August 2, 2024No CommentsREAD MORE +

When a user located in London visits Thomas's domain, to which location does Amazon Route 53 route the user request?

Thomas Gibson is a cloud security engineer working in a multinational company. Thomas has created a Route 53 record set from his domain to a system in Florida, and a similar record to machines in Paris and Singapore. Assume that network conditions remain unchanged and Thomas has hosted the application...

August 2, 2024No CommentsREAD MORE +

Which of the following GCP services can help the client?

A client wants to restrict access to its Google Cloud Platform (GCP) resources to a specified IP range by making a trust-list. Accordingly, the client limits GCP access to users in its organization network or grants company auditors access to a requested GCP resource only. Which of the following GCP...

August 2, 2024No CommentsREAD MORE +

Based on the given information, which of the following data are being generated by Kurt's organization?

SecureSoft IT Pvt. Ltd. is an IT company located in Charlotte, North Carolina, that develops software for the healthcare industry. The organization generates a tremendous amount of unorganized data such as video and audio files. Kurt recently joined SecureSoft IT Pvt. Ltd. as a cloud security engineer. He manages the...

August 2, 2024No CommentsREAD MORE +

Which cloud service model should it consider?

A BPO company would like to expand its business and provide 24 x 7 customer service. Therefore, the organization wants to migrate to a fully functional cloud environment that provides all features with minimum maintenance and administration. Which cloud service model should it consider?A . laaSB . PaaSC . RaaSD...

August 2, 2024No CommentsREAD MORE +

Which of the following command lines should Kevin use to change the #PermitRootLogin yes line to disable password-based remote logins?

Kevin Ryan has been working as a cloud security engineer over the past 2 years in a multinational company, which uses AWS-based cloud services. He launched an EC2 instance with Amazon Linux AMI. By disabling password-based remote logins, Kevin wants to eliminate all possible loopholes through which an attacker can...

August 2, 2024No CommentsREAD MORE +