Which of the following aspects of virtualization make the technology useful for evidence collection? [A] Snapshotting [B] Hypervisors [C] Pooled resources [D] Live migration

Fundamentals of Information Systems
9th Edition
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Ralph Stair, George Reynolds
Chapter9: Cybercrime And Information System Security
Section: Chapter Questions
Problem 1.1CS
icon
Related questions
Question

[5] Which of the following aspects of virtualization make the technology useful for evidence collection?

[A] Snapshotting

[B] Hypervisors

[C] Pooled resources

[D] Live migration

 

[6] Security controls for all types of cloud services and models are driven primarily by which of
       the following?

 [A] Business requirements
 [B] Regulations
 [C] State laws
 [D] Best practices

 

[7] Privileged user (administrators, managers, and so forth) accounts need to be reviewed more closely than basic user accounts. Why is this?


[A] Privileged users can cause more damage to the organization.

[B] Privileged users have more encryption keys.

[C] Regular users are more trustworthy.

[D] There are extra controls on privileged user accounts.

Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Cloud Computing
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Fundamentals of Information Systems
Fundamentals of Information Systems
Computer Science
ISBN:
9781337097536
Author:
Ralph Stair, George Reynolds
Publisher:
Cengage Learning
Management Of Information Security
Management Of Information Security
Computer Science
ISBN:
9781337405713
Author:
WHITMAN, Michael.
Publisher:
Cengage Learning,