When investigating an incident in an Infrastructure as a Service (IaaS) environment, the user can investigate:
E. Their own virtual instances in the cloud.
In an IaaS environment, users have control over their own virtual instances or virtual machines deployed within the cloud infrastructure. They have the ability to access and investigate their own virtual instances to gather logs, analyze configurations, review security settings, and identify any potential issues or indicators of compromise.
However, it is important to note that users typically do not have access to investigate other customers' virtual instances or the underlying infrastructure controlled by the cloud service provider (CSP). Investigating the CSP server facility, logs of other customers in a multi-tenant cloud, network components controlled by the CSP, or the CSP office spaces would generally be outside the user's scope of investigation.
upvoted 6 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Brainiac
Highly Voted 3 weeks, 2 days ago