FORGC1
Quiz
•
Other
•
Professional Development
•
Practice Problem
•
Easy
shyrlyn valdez
Used 3+ times
FREE Resource
Enhance your content in a minute
22 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What field allows analysts to track individual emails through various log entries when investigating IMAP clients that use the Bind operation?
Message ID
MailboxUPN
Mailbox Trace
MessageGUID
Answer explanation
IMAP (and POP3) clients will download individual emails using a Bind operation. This is an advantage, as you can track individual emails by following the "Message ID" field through various log entries.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which PowerShell command would a security admin run to determine whether Exchange mailbox auditing was enabled?
Get-Mailbox –Identity admin
Search-Mailbox [[-Identity] <MailboxIdParameter>]
Search-Mailbox [[-Identity] ]
Get-OrganizationalConfig | Format-List AuditDisabled
Get-OrganizationalConfig | Format-List AuditDisabled
Search-UnifiedAuditLog
Answer explanation
The PowerShell command "Get-OrganizationConfig | Format-List AuditDisabled" will help you confirm that audit logs are not disabled (meaning they are enabled). The double negative can be confusing: false means that auditing is turned on.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What two components are required to make a call to the Graph API and obtain an authorization token?
Tenant ID and authToken
Application ID and client secret
Application ID and client ID
Scope and operation result
Answer explanation
By providing the application ID (ClientID) and the client secret, you can make a call to the Graph API and obtain an authorization token.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is an important consideration for DFIR when investigating incidents involving containers like Kubernetes or Docker?
Containers make it easier to perform forensics due to their lightweight footprint.
Specialized tooling and configurations are not required for full visibility.
All log data may be purged on container exit.
Access to logs must be negotiated with the cloud provider up front.
Answer explanation
Serverless and containers are hot topics. Containers are a great way to sandbox an application, while serverless is an efficient way to run a small amount of code. From a DFIR perspective, they both represent challenges. Containers are likely to purge all log data on exit, while serverless typically runs for a short amount of time, leaving very little in terms of logs.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is the customer responsible for in the shared responsibility model of the cloud, regardless of cloud type?
Responses
Logical and physical network configuration
Physical datacenter
Information and data
Operating system and physical hosts
Answer explanation
Each cloud vendor has a shared responsibility model explaining what they will take care of versus what the customer is expected to handle. Regardless of cloud type, the customer is ultimately responsible for the information and data they put in the cloud.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is an important financial consideration when planning to store disks and snapshots from forensic investigations in the cloud on a long-term basis?
Disks and snapshots have dynamic pricing based on the number of CPUs and the memory of the VM mapping them.
Disks and snapshots have an initial, one-time cost only.
Disk and snapshots accrue cost only when the virtual machine that maps them is running.
Disks and snapshots accrue cost all the time, until they are deleted.
Answer explanation
Clouds use a per-consumption model, which means everything you do has a cost. Disks and snapshots are examples of persistent costs, which accrue constantly until the resource or object is deleted. There are also temporary costs, which accrue only when the resource is running, such as with a virtual machine.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which mailbox action would move an email message to the Recoverable Items folder in Exchange?
SoftDelete
MailItemsAccessed
MoveToDeletedItems
HardDelete
Answer explanation
The SoftDelete action moves messages to the Recoverable Items folder. HardDelete purges items from that folder. MoveToDeletedItems moves them to the Deleted Items folder. MailItemsAccessed shows when items are accessed, not when they are deleted.
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
20 questions
GKC - Weekly Quiz 11 - Dinosaurs
Quiz
•
1st Grade - Professio...
20 questions
Edukasi Rupiah Kepada PERBARINDO Tahun 2024
Quiz
•
Professional Development
20 questions
Jõulufilmide viktoriin
Quiz
•
5th Grade - Professio...
20 questions
World Book Day 2020
Quiz
•
KG - Professional Dev...
18 questions
CHIJ Spirit Day Quiz 2022
Quiz
•
Professional Development
20 questions
April Safetyfirst Campaign Quiz
Quiz
•
Professional Development
20 questions
DPB2012 Entrepreneurship
Quiz
•
Professional Development
20 questions
Integria - Rebuttals
Quiz
•
Professional Development
Popular Resources on Wayground
10 questions
Honoring the Significance of Veterans Day
Interactive video
•
6th - 10th Grade
9 questions
FOREST Community of Caring
Lesson
•
1st - 5th Grade
10 questions
Exploring Veterans Day: Facts and Celebrations for Kids
Interactive video
•
6th - 10th Grade
19 questions
Veterans Day
Quiz
•
5th Grade
14 questions
General Technology Use Quiz
Quiz
•
8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
15 questions
Circuits, Light Energy, and Forces
Quiz
•
5th Grade
19 questions
Thanksgiving Trivia
Quiz
•
6th Grade
