WGU Digital-Forensics-in-Cybersecurity - Digital Forensics in Cybersecurity (D431/C840DQO1) Course Exam
Total 79 questions
The chief executive officer (CEO) of a small computer company has identified a potential hacking attack from an outside competitor.
Which type of evidence should a forensics investigator use to identify the source of the hack?
Which characteristic applies to magnetic drives compared to solid-state drives (SSDs)?
Which Windows 7 operating system log stores events collected from remote computers?
Which tool should a forensic investigator use to determine whether data are leaving an organization through steganographic methods?
Which law includes a provision permitting the wiretapping of VoIP calls?
Thomas received an email stating he needed to follow a link and verify his bank account information to ensure it was secure. Shortly after following the instructions, Thomas noticed money was missing from his account.
Which digital evidence should be considered to determine how Thomas' account information was compromised?
What is a reason to use steganography?
Which directory contains the system's configuration files on a computer running Mac OS X?
The human resources manager of a small accounting firm believes he may have been a victim of a phishing scam. The manager clicked on a link in an email message that asked him to verify the logon credentials for the firm's online bank account.
Which digital evidence should a forensic investigator collect to investigate this incident?
A forensic investigator wants to collect evidence from a file created by a Macintosh computer running OS X 10.8.
Which file type can be created by this OS?
