Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > WGU > Courses and Certificates > Digital-Forensics-in-Cybersecurity

Digital-Forensics-in-Cybersecurity Digital Forensics in Cybersecurity (D431/C840) Course Exam Question and Answers

Question # 4

Which term describes the used space between the end of a file and the end of the last cluster assigned to the file?

A.

Unallocated space

B.

Volume slack

C.

Host protected area

D.

File slack

Full Access
Question # 5

A company has identified that a hacker has modified files on one of the company's computers. The IT department has collected the storage media from the hacked computer.

Which evidence should be obtained from the storage media to identify which files were modified?

A.

File timestamps

B.

Private IP addresses

C.

Public IP addresses

D.

Operating system version

Full Access
Question # 6

An employee sends an email message to a fellow employee. The message is sent through the company's messaging server.

Which protocol is used to send the email message?

A.

SNMP

B.

IMAP

C.

POP3

D.

SMTP

Full Access
Question # 7

A computer involved in a crime is infected with malware. The computer is on and connected to the company's network. The forensic investigator arrives at the scene.

Which action should be the investigator's first step?

A.

Turn off the computer

B.

Unplug the computer's Ethernet cable

C.

Run malware removal tools

D.

Copy files to external media

Full Access
Question # 8

Which type of storage format should be transported in a special bag to reduce electrostatic interference?

A.

Solid-state drives

B.

Magnetic media

C.

Optical discs

D.

Flash drives

Full Access
Question # 9

A forensics investigator is investigating a Windows computer which may be collecting data from other computers on the network.

Which Windows command line tool can be used to determine connections between machines?

A.

Telnet

B.

Xdetect

C.

Openfiles

D.

Netstat

Full Access
Question # 10

A forensic investigator needs to identify where email messages are stored on a Microsoft Exchange server.

Which file extension is used by Exchange email servers to store the mailbox database?

A.

.edb

B.

.nsf

C.

.mail

D.

.db

Full Access
Question # 11

An organization has identified a system breach and has collected volatile data from the system.

Which evidence type should be collected next?

A.

Running processes

B.

Network connections

C.

Temporary data

D.

File timestamps

Full Access
Question # 12

Which tool should a forensic investigator use to determine whether data are leaving an organization through steganographic methods?

A.

Data Encryption Standard (DES)

B.

MP3Stego

C.

Netstat

D.

Forensic Toolkit (FTK)

Full Access
Question # 13

Which forensics tool can be used to bypass the passcode of an Apple iPhone running the iOS operating system?

A.

iStumbler

B.

Ophcrack

C.

LOphtCrack

D.

XRY

Full Access
Question # 14

Which principle of evidence collection states that access to evidence must be tracked from the time it is seized through its use in court?

A.

Evidence record

B.

Chain of custody

C.

Event log

D.

Audit log

Full Access
Question # 15

What are the three basic tasks that a systems forensic specialist must keep in mind when handling evidence during a cybercrime investigation?

A.

Find evidence, preserve evidence, and prepare evidence

B.

Find evidence, analyze evidence, and prosecute evidence

C.

Preserve evidence, encrypt evidence, and delete evidence

D.

Analyze evidence, prepare evidence, and document evidence

Full Access
Question # 16

Which file stores local Windows passwords in the Windows\System32\ directory and is subject to being cracked by using a live CD?

A.

SAM

B.

IPSec

C.

HAL

D.

Ntidr

Full Access
Question # 17

A forensic investigator suspects that spyware has been installed to a Mac OS X computer by way of an update.

Which Mac OS X log or folder stores information about system and software updates?

A.

/var/spool/cups

B.

/var/log/daily.out

C.

/var/vm

D.

/Library/Receipts

Full Access
Question # 18

A victim of Internet fraud fell for an online offer after using a search engine to find a deal on an expensive software purchase. Once the victim learned about the fraud, he contacted a forensic investigator for help.

Which digital evidence should the investigator collect?

A.

Virus signatures

B.

Whois records

C.

Computer logs

D.

Email headers

Full Access
Question # 19

Which tool identifies the presence of steganography?

A.

Disk Investigator

B.

DiskDigger

C.

Forensic Toolkit (FTK)

D.

ComputerCOP

Full Access
Question # 20

A forensic investigator is acquiring evidence from an iPhone.

What should the investigator ensure before the iPhone is connected to the computer?

A.

That the phone is in jailbreak mode

B.

That the phone avoids syncing with the computer

C.

That the phone is powered off

D.

That the phone has root privilege

Full Access
Question # 21

Thomas received an email stating he needed to follow a link and verify his bank account information to ensure it was secure. Shortly after following the instructions, Thomas noticed money was missing from his account.

Which digital evidence should be considered to determine how Thomas' account information was compromised?

A.

Email messages

B.

Browser cache

C.

Bank transaction logs

D.

Firewall logs

Full Access
Question # 22

Which Windows component is responsible for reading the boot.ini file and displaying the boot loader menu on Windows XP during the boot process?

A.

BOOTMGR

B.

NTLDR

C.

Winload.exe

D.

BCD

Full Access