Which is a limitation of AWS Lambdas?
A. Functions must run in less than 15 minutes
B. They can be quite costly to operate
C. Managing systems can be time consuming
D. They only support up to 256 MB of storage
Which performance feature of an Amazon EC2 instance is configured to add additional resources based on set trigger points?
A. Burstable
B. Optimized
C. Managed
D. Accelerated
What Pub/Sub component is used to forward GCP logs to their final location?
A. Topic
B. Log Sink
C. Publication
D. Subscription
At which level of an Azure cloud deployment are resource management logs generated?
A. Management Group
B. Resource Group
C. Tenant
D. Subscription
In which scenario would an investigator collect NetFlow logs rather than PCAP logs?
A. To save on storage space
B. For detailed network monitoring
C. For deep packet inspection
D. To collect application layer data
A data exfiltrationinvestigation of a GCP storage bucket is limited to the information logged by default in the Cost Table of Google's Cloud Billing. What information will investigators be able to gather?
A. IP addresses associated with file downloads
B. Timeframes of file downloads
C. Filenames of downloaded files
D. Usernames associated with file downloads
After registering the application in Azure AD, what is the next step to take in order to use Microsoft Graph API?
A. Request access tokens from Azure An
B. Call the Graph API
C. Configure app permission
D. Get Microsoft 365global admin approval
How is storage account, cs21003200042c87633, created in an Azure resource group?
A. PowerShell Cloud Shell audit logging was enabled
B. A Bash Cloud Shell was used
C. PowerShelI Cloud Shell was used
D. Azure CLI was used from a Windows machine
Which of the following operating systems are used by Blackberry 10 and found in some vehicles and medical devices?
A. Bada
B. POSIX
C. QNX
D. UNIX
A company using PaaS to host and develop their software application is experiencing a DOS attack. What challenge will a DFIR analyst experience when investigating this attack?
A. Restricted access to their application logs
B. Resource scaling will affect access to logs
C. Network logs are unavailable for review
D. Network monitoring disabled by the company