Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

WGU Digital-Forensics-in-Cybersecurity - Digital Forensics in Cybersecurity (D431/C840) Course Exam

Which law requires both parties to consent to the recording of a conversation?

A.

Health Insurance Portability and Accountability Act (HIPAA)

B.

Electronic Communications Privacy Act (ECPA)

C.

Wiretap Act

D.

Stored Communications Act

Susan was looking at her credit report and noticed that several new credit cards had been opened lately in her name. Susan has not opened any of the credit card accounts herself.

Which type of cybercrime has been perpetrated against Susan?

A.

Identity theft

B.

SQL injection

C.

Cyberstalking

D.

Malware

What is a reason to use steganography?

A.

To save secret data

B.

To highlight secret data

C.

To erase secret data

D.

To delete secret data

An employee sends an email message to a fellow employee. The message is sent through the company's messaging server.

Which protocol is used to send the email message?

A.

SNMP

B.

IMAP

C.

POP3

D.

SMTP

Which operating system creates a swap file to temporarily store information from memory on the hard drive when needed?

A.

Linux

B.

Mac

C.

Unix

D.

Windows

A cybercriminal hacked into an Apple iPad that belongs to a company's chief executive officer (CEO). The cybercriminal deleted some important files on the data volume that must be retrieved.

Which hidden folder will contain the digital evidence?

A.

/Private/etc

B.

/lost+found

C.

/.Trashes/501

D.

/etc

A forensic investigator is acquiring evidence from an iPhone.

What should the investigator ensure before the iPhone is connected to the computer?

A.

That the phone is in jailbreak mode

B.

That the phone avoids syncing with the computer

C.

That the phone is powered off

D.

That the phone has root privilege

Which law requires a search warrant or one of the recognized exceptions to search warrant requirements for searching email messages on a computer?

A.

The Fourth Amendment to the U.S. Constitution

B.

Electronic Communications Privacy Act (ECPA)

C.

Stored Communications Act

D.

Communications Assistance to Law Enforcement Act (CALEA)

Which description applies to the Advanced Forensic Format (AFF)?

A.

An open file standard developed by AccessData

B.

A proprietary format used by the iLook tool

C.

An open file standard used by Sleuth Kit and Autopsy

D.

A proprietary format developed by Guidance Software

The chief executive officer (CEO) of a small computer company has identified a potential hacking attack from an outside competitor.

Which type of evidence should a forensics investigator use to identify the source of the hack?

A.

Network transaction logs

B.

Email archives

C.

File system metadata

D.

Browser history