New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

WGU Digital-Forensics-in-Cybersecurity - Digital Forensics in Cybersecurity (D431/C840DQO1) Course Exam

The chief executive officer (CEO) of a small computer company has identified a potential hacking attack from an outside competitor.

Which type of evidence should a forensics investigator use to identify the source of the hack?

A.

Network transaction logs

B.

Email archives

C.

File system metadata

D.

Browser history

Which characteristic applies to magnetic drives compared to solid-state drives (SSDs)?

A.

Higher cost

B.

Lower cost

C.

Less susceptible to damage

D.

Faster read/write speeds

Which Windows 7 operating system log stores events collected from remote computers?

A.

System

B.

Application

C.

ForwardedEvents

D.

Security

Which tool should a forensic investigator use to determine whether data are leaving an organization through steganographic methods?

A.

Data Encryption Standard (DES)

B.

MP3Stego

C.

Netstat

D.

Forensic Toolkit (FTK)

Which law includes a provision permitting the wiretapping of VoIP calls?

A.

Communications Assistance to Law Enforcement Act (CALEA)

B.

Electronic Communications Privacy Act (ECPA)

C.

Health Insurance Portability and Accountability Act (HIPAA)

D.

Stored Communications Act

Thomas received an email stating he needed to follow a link and verify his bank account information to ensure it was secure. Shortly after following the instructions, Thomas noticed money was missing from his account.

Which digital evidence should be considered to determine how Thomas' account information was compromised?

A.

Email messages

B.

Browser cache

C.

Bank transaction logs

D.

Firewall logs

What is a reason to use steganography?

A.

To save secret data

B.

To highlight secret data

C.

To erase secret data

D.

To delete secret data

Which directory contains the system's configuration files on a computer running Mac OS X?

A.

/var

B.

/bin

C.

/etc

D.

/cfg

The human resources manager of a small accounting firm believes he may have been a victim of a phishing scam. The manager clicked on a link in an email message that asked him to verify the logon credentials for the firm's online bank account.

Which digital evidence should a forensic investigator collect to investigate this incident?

A.

Email headers

B.

Browser cache

C.

System logs

D.

Network traffic logs

A forensic investigator wants to collect evidence from a file created by a Macintosh computer running OS X 10.8.

Which file type can be created by this OS?

A.

ReiserFS

B.

MFS

C.

HFS+

D.

NTFS