ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 27 - 312-40 discussion

Report
Export

Global CyberSec Pvt. Ltd. is an IT company that provides software and application services related to cybersecurity. Owing to the robust security features offered by Microsoft Azure, the organization adopted the Azure cloud environment. A security incident was detected on the Azure cloud platform. Global CyberSec Pvt. Ltd.'s security team examined the log data collected from various sources. They found that the VM was affected. In this scenario, when should the backup copy of the snapshot be taken in a blob container as a page blob during the forensic acquisition of the compromised Azure VM?

A.
After deleting the snapshot from the source resource group
Answers
A.
After deleting the snapshot from the source resource group
B.
Before mounting the snapshot onto the forensic workstation
Answers
B.
Before mounting the snapshot onto the forensic workstation
C.
After mounting the snapshot onto the forensic workstation
Answers
C.
After mounting the snapshot onto the forensic workstation
D.
Before deleting the snapshot from the source resource group
Answers
D.
Before deleting the snapshot from the source resource group
Suggested answer: B

Explanation:

In the context of forensic acquisition of a compromised Azure VM, it is crucial to maintain the integrity of the evidence. The backup copy of the snapshot should be taken before any operations that could potentially alter the data are performed. This means creating the backup copy in a blob container as a page blob before mounting the snapshot onto the forensic workstation.

Here's the process:

1.Create Snapshot: First, a snapshot of the VM's disk is created to capture the state of the VM at the point of compromise.

1.Backup Copy: Before the snapshot is mounted onto the forensic workstation for analysis, a backup copy of the snapshot should be taken and stored in a blob container as a page blob.

1.Maintain Integrity: This step ensures that the original snapshot remains unaltered and can be used as evidence, maintaining the chain of custody.

1.Forensic Analysis: After the backup copy is secured, the snapshot can be mounted onto the forensic workstation for detailed analysis.

1.Documentation: All steps taken during the forensic acquisition process should be thoroughly documented for legal and compliance purposes.

Microsoft's guidelines on the computer forensics chain of custody in Azure, which include the process of handling VM snapshots for forensic purposes1.

asked 18/09/2024
Arslan Sheik
37 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first