WGU Digital-Forensics-in-Cybersecurity - Digital Forensics in Cybersecurity (D431/C840) Course Exam
Total 74 questions
Which law requires both parties to consent to the recording of a conversation?
Susan was looking at her credit report and noticed that several new credit cards had been opened lately in her name. Susan has not opened any of the credit card accounts herself.
Which type of cybercrime has been perpetrated against Susan?
What is a reason to use steganography?
An employee sends an email message to a fellow employee. The message is sent through the company's messaging server.
Which protocol is used to send the email message?
Which operating system creates a swap file to temporarily store information from memory on the hard drive when needed?
A cybercriminal hacked into an Apple iPad that belongs to a company's chief executive officer (CEO). The cybercriminal deleted some important files on the data volume that must be retrieved.
Which hidden folder will contain the digital evidence?
A forensic investigator is acquiring evidence from an iPhone.
What should the investigator ensure before the iPhone is connected to the computer?
Which law requires a search warrant or one of the recognized exceptions to search warrant requirements for searching email messages on a computer?
Which description applies to the Advanced Forensic Format (AFF)?
The chief executive officer (CEO) of a small computer company has identified a potential hacking attack from an outside competitor.
Which type of evidence should a forensics investigator use to identify the source of the hack?