New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium WGU Digital-Forensics-in-Cybersecurity Dumps Questions Answers

Digital Forensics in Cybersecurity (D431/C840DQO1) Course Exam Questions and Answers

Question 1

An employee sends an email message to a fellow employee. The message is sent through the company's messaging server.

Which protocol is used to send the email message?

Options:

A.

SNMP

B.

IMAP

C.

POP3

D.

SMTP

Buy Now
Question 2

A cybercriminal hacked into an Apple iPad that belongs to a company's chief executive officer (CEO). The cybercriminal deleted some important files on the data volume that must be retrieved.

Which hidden folder will contain the digital evidence?

Options:

A.

/Private/etc

B.

/lost+found

C.

/.Trashes/501

D.

/etc

Question 3

After a company's single-purpose, dedicated messaging server is hacked by a cybercriminal, a forensics expert is hired to investigate the crime and collect evidence.

Which digital evidence should be collected?

Options:

A.

Server configuration files

B.

Firewall logs

C.

Email contents

D.

User login credentials

Question 4

Which type of storage format should be transported in a special bag to reduce electrostatic interference?

Options:

A.

Solid-state drives

B.

Magnetic media

C.

Optical discs

D.

Flash drives

Question 5

Which tool should a forensic investigator use to determine whether data are leaving an organization through steganographic methods?

Options:

A.

Data Encryption Standard (DES)

B.

MP3Stego

C.

Netstat

D.

Forensic Toolkit (FTK)

Question 6

Which law includes a provision permitting the wiretapping of VoIP calls?

Options:

A.

Communications Assistance to Law Enforcement Act (CALEA)

B.

Electronic Communications Privacy Act (ECPA)

C.

Health Insurance Portability and Accountability Act (HIPAA)

D.

Stored Communications Act

Question 7

Which universal principle must be observed when handling digital evidence?

Options:

A.

Avoid making changes to the evidence

B.

Make a copy and analyze the original

C.

Get the signatures of two witnesses

D.

Keep the evidence in a plastic bag

Question 8

What is a reason to use steganography?

Options:

A.

To save secret data

B.

To highlight secret data

C.

To erase secret data

D.

To delete secret data

Question 9

Which method is used to implement steganography through pictures?

Options:

A.

Metadata alteration

B.

Least Significant Bit (LSB) insertion

C.

Encrypting image pixels

D.

File compression

Question 10

What is one purpose of steganography?

Options:

A.

To encrypt data for security

B.

To deliver information secretly

C.

To compress large files

D.

To delete files securely

Question 11

A forensic investigator is acquiring evidence from an iPhone.

What should the investigator ensure before the iPhone is connected to the computer?

Options:

A.

That the phone is in jailbreak mode

B.

That the phone avoids syncing with the computer

C.

That the phone is powered off

D.

That the phone has root privilege

Question 12

Which file system is supported by Mac?

Options:

A.

NTFS

B.

EXT4

C.

Hierarchical File System Plus (HFS+)

D.

FAT32

Question 13

A forensic scientist is examining a computer for possible evidence of a cybercrime.

Why should the forensic scientist copy files at the bit level instead of the OS level when copying files from the computer to a forensic computer?

Options:

A.

Copying files at the OS level fails to copy deleted files or slack space.

B.

Copying files at the OS level takes too long to be practical.

C.

Copying files at the OS level changes the timestamp of the files.

D.

Copying files at the OS level will copy extra information that is unnecessary.

Question 14

How should a forensic scientist obtain the network configuration from a Windows PC before seizing it from a crime scene?

Options:

A.

By checking the system properties

B.

By using the ipconfig command from a command prompt on the computer

C.

By opening the Network and Sharing Center

D.

By rebooting the computer into safe mode

Question 15

Which Windows 7 operating system log stores events collected from remote computers?

Options:

A.

System

B.

Application

C.

ForwardedEvents

D.

Security

Question 16

Which law requires a search warrant or one of the recognized exceptions to search warrant requirements for searching email messages on a computer?

Options:

A.

The Fourth Amendment to the U.S. Constitution

B.

Electronic Communications Privacy Act (ECPA)

C.

Stored Communications Act

D.

Communications Assistance to Law Enforcement Act (CALEA)

Question 17

What are the three basic tasks that a systems forensic specialist must keep in mind when handling evidence during a cybercrime investigation?

Options:

A.

Find evidence, preserve evidence, and prepare evidence

B.

Find evidence, analyze evidence, and prosecute evidence

C.

Preserve evidence, encrypt evidence, and delete evidence

D.

Analyze evidence, prepare evidence, and document evidence

Question 18

Tom saved a message using the least significant bit (LSB) method in a sound file and uploaded this sound to his own website.

What is the carrier in this example?

Options:

A.

The least significant bit method

B.

Tom's website

C.

The sound file

D.

The message

Question 19

Which U.S. law protects journalists from turning over their work or sources to law enforcement before the information is shared with the public?

Options:

A.

The Privacy Protection Act (PPA)

B.

Health Insurance Portability and Accountability Act (HIPAA)

C.

Electronic Communications Privacy Act (ECPA)

D.

Communications Assistance to Law Enforcement Act (CALEA)

Question 20

Which storage format is a magnetic drive?

Options:

A.

CD-ROM

B.

SATA

C.

Blu-ray

D.

SSD

Question 21

A forensic investigator needs to know which file type to look for in order to find emails from a specific client.

Which file extension is used by Eudora?

Options:

A.

.dbx

B.

.ost

C.

.pst

D.

.mbx

Question 22

On which file does the Windows operating system store hashed passwords?

Options:

A.

SAM

B.

Kerberos

C.

System

D.

NTUSER.dat

Question 23

A user at a company attempts to hide the combination to a safe that stores confidential information in a data file called vacationdetails.doc.

What is vacationdetails.doc called, in steganographic terms?

Options:

A.

Payload

B.

Snow

C.

Carrier

D.

Channel