Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

WGU Digital-Forensics-in-Cybersecurity - Digital Forensics in Cybersecurity (D431/C840) Course Exam

Which characteristic applies to magnetic drives compared to solid-state drives (SSDs)?

A.

Higher cost

B.

Lower cost

C.

Less susceptible to damage

D.

Faster read/write speeds

How do forensic specialists show that digital evidence was handled in a protected, secure manner during the process of collecting and analyzing the evidence?

A.

By encrypting all evidence

B.

By maintaining the chain of custody

C.

By deleting temporary files

D.

By performing backups

The human resources manager of a small accounting firm believes he may have been a victim of a phishing scam. The manager clicked on a link in an email message that asked him to verify the logon credentials for the firm's online bank account.

Which digital evidence should a forensic investigator collect to investigate this incident?

A.

Email headers

B.

Browser cache

C.

System logs

D.

Network traffic logs

Which law or guideline lists the four states a mobile device can be in when data is extracted from it?

A.

Health Insurance Portability and Accountability Act (HIPAA)

B.

NIST SP 800-72 Guidelines

C.

Electronic Communications Privacy Act (ECPA)

D.

Communications Assistance to Law Enforcement Act (CALEA)

Which method of copying digital evidence ensures proper evidence collection?

A.

File-level copy

B.

Bit-level copy

C.

Cloud backup

D.

Encrypted transfer

How should a forensic scientist obtain the network configuration from a Windows PC before seizing it from a crime scene?

A.

By checking the system properties

B.

By using the ipconfig command from a command prompt on the computer

C.

By opening the Network and Sharing Center

D.

By rebooting the computer into safe mode

The following line of code is an example of how to make a forensic copy of a suspect drive:

dd if=/dev/mem of=/evidence/image.memory1

Which operating system should be used to run this command?

A.

Windows

B.

Linux

C.

MacOS

D.

Unix

While collecting digital evidence from a running computer involved in a cybercrime, the forensic investigator makes a list of items that need to be collected.

Which piece of digital evidence should be collected first?

A.

Security logs

B.

Chat room logs

C.

Recently accessed files

D.

Temporary Internet files

A forensic investigator needs to identify where email messages are stored on a Microsoft Exchange server.

Which file extension is used by Exchange email servers to store the mailbox database?

A.

.edb

B.

.nsf

C.

.mail

D.

.db

Which tool should be used with sound files, video files, and image files?

A.

Snow

B.

MP3Stego

C.

StegVideo

D.

Stealth Files 4