New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

WGU Digital-Forensics-in-Cybersecurity - Digital Forensics in Cybersecurity (D431/C840DQO1) Course Exam

The chief information officer of an accounting firm believes sensitive data is being exposed on the local network.

Which tool should the IT staff use to gather digital evidence about this security vulnerability?

A.

Firewall

B.

Sniffer

C.

Antivirus

D.

Packet filter

Which United States law requires telecommunications equipment manufacturers to provide built-in surveillance capabilities for federal agencies?

A.

Health Insurance Portability and Accountability Act (HIPAA)

B.

Communications Assistance to Law Enforcement Act (CALEA)

C.

Electronic Communications Privacy Act (ECPA)

D.

The Privacy Protection Act (PPA)

Which principle of evidence collection states that access to evidence must be tracked from the time it is seized through its use in court?

A.

Evidence record

B.

Chain of custody

C.

Event log

D.

Audit log

Which technique allows a cybercriminal to hide information?

A.

Steganalysis

B.

Steganography

C.

Encryption

D.

Cryptography

A forensic specialist is about to collect digital evidence from a suspect's computer hard drive. The computer is off.

What should be the specialist's first step?

A.

Carefully review the chain of custody form.

B.

Turn the computer on and remove any malware.

C.

Make a forensic copy of the computer's hard drive.

D.

Turn the computer on and photograph the desktop.

A forensic investigator is acquiring evidence from an iPhone.

What should the investigator ensure before the iPhone is connected to the computer?

A.

That the phone is in jailbreak mode

B.

That the phone avoids syncing with the computer

C.

That the phone is powered off

D.

That the phone has root privilege

Which tool can be used to make a bit-by-bit copy of a Windows Phone 8?

A.

Forensic Toolkit (FTK)

B.

Data Doctor

C.

Pwnage

D.

Wolf

A cybercriminal communicates with his compatriots using steganography. The FBI discovers that the criminal group uses white space to hide data in photographs.

Which tool can the cybercriminals use to facilitate this type of communication?

A.

Steganophony

B.

Wolf

C.

Snow

D.

QuickStego

A user at a company attempts to hide the combination to a safe that stores confidential information in a data file called vacationdetails.doc.

What is vacationdetails.doc called, in steganographic terms?

A.

Payload

B.

Snow

C.

Carrier

D.

Channel

Where is the default location for 32-bit programs installed by a user on a 64-bit version of Windows 7?

A.

C:\ProgramData

B.

C:\Program files

C.

C:\Windows

D.

C:\Program files (x86)