WGU Digital-Forensics-in-Cybersecurity - Digital Forensics in Cybersecurity (D431/C840DQO1) Course Exam
Total 79 questions
The chief information officer of an accounting firm believes sensitive data is being exposed on the local network.
Which tool should the IT staff use to gather digital evidence about this security vulnerability?
Which United States law requires telecommunications equipment manufacturers to provide built-in surveillance capabilities for federal agencies?
Which principle of evidence collection states that access to evidence must be tracked from the time it is seized through its use in court?
Which technique allows a cybercriminal to hide information?
A forensic specialist is about to collect digital evidence from a suspect's computer hard drive. The computer is off.
What should be the specialist's first step?
A forensic investigator is acquiring evidence from an iPhone.
What should the investigator ensure before the iPhone is connected to the computer?
Which tool can be used to make a bit-by-bit copy of a Windows Phone 8?
A cybercriminal communicates with his compatriots using steganography. The FBI discovers that the criminal group uses white space to hide data in photographs.
Which tool can the cybercriminals use to facilitate this type of communication?
A user at a company attempts to hide the combination to a safe that stores confidential information in a data file called vacationdetails.doc.
What is vacationdetails.doc called, in steganographic terms?
Where is the default location for 32-bit programs installed by a user on a 64-bit version of Windows 7?
