New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > WGU > Courses and Certificates > Digital-Forensics-in-Cybersecurity

Digital-Forensics-in-Cybersecurity Digital Forensics in Cybersecurity (D431/C840DQO1) Course Exam Question and Answers

Question # 4

Which law requires both parties to consent to the recording of a conversation?

A.

Health Insurance Portability and Accountability Act (HIPAA)

B.

Electronic Communications Privacy Act (ECPA)

C.

Wiretap Act

D.

Stored Communications Act

Full Access
Question # 5

Which information is included in an email header?

A.

Sender's MAC address

B.

Number of pages

C.

Content-Type

D.

Message-Digest

Full Access
Question # 6

Which law requires a search warrant or one of the recognized exceptions to search warrant requirements for searching email messages on a computer?

A.

The Fourth Amendment to the U.S. Constitution

B.

Electronic Communications Privacy Act (ECPA)

C.

Stored Communications Act

D.

Communications Assistance to Law Enforcement Act (CALEA)

Full Access
Question # 7

What are the three basic tasks that a systems forensic specialist must keep in mind when handling evidence during a cybercrime investigation?

A.

Find evidence, preserve evidence, and prepare evidence

B.

Find evidence, analyze evidence, and prosecute evidence

C.

Preserve evidence, encrypt evidence, and delete evidence

D.

Analyze evidence, prepare evidence, and document evidence

Full Access
Question # 8

The chief executive officer (CEO) of a small computer company has identified a potential hacking attack from an outside competitor.

Which type of evidence should a forensics investigator use to identify the source of the hack?

A.

Network transaction logs

B.

Email archives

C.

File system metadata

D.

Browser history

Full Access
Question # 9

A digital forensic examiner receives a computer used in a hacking case. The examiner is asked to extract information from the computer's Registry.

How should the examiner proceed when obtaining the requested digital evidence?

A.

Ensure that any tools and techniques used are widely accepted

B.

Investigate whether the computer was properly seized

C.

Enlist a colleague to witness the investigative process

D.

Download a tool from a hacking website to extract the data

Full Access
Question # 10

Which law includes a provision permitting the wiretapping of VoIP calls?

A.

Communications Assistance to Law Enforcement Act (CALEA)

B.

Electronic Communications Privacy Act (ECPA)

C.

Health Insurance Portability and Accountability Act (HIPAA)

D.

Stored Communications Act

Full Access
Question # 11

Which rule is used for conducting electronic surveillance?

A.

All documents related to health informatics should be stored in perpetuity.

B.

All commercial email must provide an opt-out mechanism.

C.

Using a misleading domain name to deceive a person into viewing obscene material shall result in fines or imprisonment.

D.

Telecommunications equipment must have built-in surveillance capabilities for law enforcement.

Full Access
Question # 12

A cybercriminal hacked into an Apple iPad that belongs to a company's chief executive officer (CEO). The cybercriminal deleted some important files on the data volume that must be retrieved.

Which hidden folder will contain the digital evidence?

A.

/Private/etc

B.

/lost+found

C.

/.Trashes/501

D.

/etc

Full Access
Question # 13

Which method of copying digital evidence ensures proper evidence collection?

A.

File-level copy

B.

Bit-level copy

C.

Cloud backup

D.

Encrypted transfer

Full Access
Question # 14

Where does Windows store passwords for local user accounts?

A.

HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles

B.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WZCSVC\Parameters\Interfaces

C.

SAM file in Windows\System32

D.

Security file in Windows\System32

Full Access
Question # 15

Which tool should be used with sound files, video files, and image files?

A.

Snow

B.

MP3Stego

C.

StegVideo

D.

Stealth Files 4

Full Access
Question # 16

Which method is used to implement steganography through pictures?

A.

Metadata alteration

B.

Least Significant Bit (LSB) insertion

C.

Encrypting image pixels

D.

File compression

Full Access
Question # 17

Which law is related to the disclosure of personally identifiable protected health information (PHI)?

A.

The Privacy Protection Act (PPA)

B.

Health Insurance Portability and Accountability Act (HIPAA)

C.

Electronic Communications Privacy Act (ECPA)

D.

Communications Assistance to Law Enforcement Act (CALEA)

Full Access
Question # 18

Which operating system creates a swap file to temporarily store information from memory on the hard drive when needed?

A.

Linux

B.

Mac

C.

Unix

D.

Windows

Full Access
Question # 19

Which characteristic applies to magnetic drives compared to solid-state drives (SSDs)?

A.

Higher cost

B.

Lower cost

C.

Less susceptible to damage

D.

Faster read/write speeds

Full Access
Question # 20

Which term describes the used space between the end of a file and the end of the last cluster assigned to the file?

A.

Unallocated space

B.

Volume slack

C.

Host protected area

D.

File slack

Full Access
Question # 21

A forensic scientist arrives at a crime scene to begin collecting evidence.

What is the first thing the forensic scientist should do?

A.

Seize the computer immediately

B.

Photograph all evidence in its original place

C.

Document user passwords

D.

Run antivirus scans

Full Access
Question # 22

Which tool can be used to make a bit-by-bit copy of a Windows Phone 8?

A.

Forensic Toolkit (FTK)

B.

Data Doctor

C.

Pwnage

D.

Wolf

Full Access
Question # 23

Which policy is included in the CAN-SPAM Act?

A.

Email sender must provide a method for recipients to opt out of future emails without charge

B.

Email sender must encrypt all outgoing emails

C.

Email sender must verify the recipient’s consent before sending

D.

Email sender must include recipient IP address in the email header

Full Access