Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Courses and Certificates Digital-Forensics-in-Cybersecurity WGU Study Notes

Digital Forensics in Cybersecurity (D431/C840DQO1) Course Exam Questions and Answers

Question 9

Which method is used to implement steganography through pictures?

Options:

A.

Metadata alteration

B.

Least Significant Bit (LSB) insertion

C.

Encrypting image pixels

D.

File compression

Question 10

What is one purpose of steganography?

Options:

A.

To encrypt data for security

B.

To deliver information secretly

C.

To compress large files

D.

To delete files securely

Question 11

A forensic investigator is acquiring evidence from an iPhone.

What should the investigator ensure before the iPhone is connected to the computer?

Options:

A.

That the phone is in jailbreak mode

B.

That the phone avoids syncing with the computer

C.

That the phone is powered off

D.

That the phone has root privilege

Question 12

Which file system is supported by Mac?

Options:

A.

NTFS

B.

EXT4

C.

Hierarchical File System Plus (HFS+)

D.

FAT32