Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil Exam 312-40 Topic 2 Question 27 Discussion

Actual exam question for Eccouncil's 312-40 exam
Question #: 27
Topic #: 2
[All 312-40 Questions]

An IT company uses two resource groups, named Production-group and Security-group, under the same subscription ID. Under the Production-group, a VM called Ubuntu18 is suspected to be compromised. As a forensic investigator, you need to take a snapshot (ubuntudisksnap) of the OS disk of the suspect virtual machine Ubuntu18 for further investigation and copy the snapshot to a storage account under Security-group.

Identify the next step in the investigation of the security incident in Azure?

Show Suggested Answer Hide Answer
Suggested Answer: B

When an IT company suspects that a VM called Ubuntu18 in the Production-group has been compromised, it is essential to perform a forensic investigation. The process of taking a snapshot and ensuring its integrity and accessibility involves several steps:

Snapshot Creation: First, create a snapshot of the OS disk of the suspect VM, named ubuntudisksnap. This snapshot is a point-in-time copy of the VM's disk, ensuring that all data at that moment is captured.

Snapshot Security: Next, to transfer this snapshot securely to a storage account under the Security-group, a shared access signature (SAS) needs to be generated. A SAS provides delegated access to Azure storage resources without exposing the storage account keys.

Data Transfer: With the SAS token, the snapshot can be securely copied to a storage account in the Security-group. This method ensures that only authorized personnel can access the snapshot for further investigation.

Further Analysis: After copying the snapshot, it can be mounted onto a forensic workstation for detailed examination. This step involves examining the contents of the snapshot for any malicious activity or artifacts left by the attacker.

Generating a shared access signature is a critical step in ensuring that the snapshot can be securely accessed and transferred without compromising the integrity and security of the data.


Microsoft Azure Documentation on Shared Access Signatures (SAS)

Azure Security Best Practices and Patterns

Cloud Security Alliance (CSA) Security Guidance for Critical Areas of Focus in Cloud Computing

Contribute your Thoughts:

Lindsey
14 hours ago
I believe creating a backup copy of the snapshot in a blob container is also important for preserving evidence.
upvoted 0 times
...
Elvis
4 days ago
Option C seems the most logical choice to me. Storing the snapshot in a blob container under the Security-group would ensure better security and control during the investigation.
upvoted 0 times
...
Sina
4 days ago
I agree with Donte, mounting the snapshot will allow us to analyze the compromised VM.
upvoted 0 times
...
Donte
9 days ago
I think the next step is to mount the snapshot onto the forensic workstation.
upvoted 0 times
...

Save Cancel