Summer Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: wrap60

WGU Digital-Forensics-in-Cybersecurity Dumps

Digital Forensics in Cybersecurity (D431/C840) Course Exam Questions and Answers

Question 1

While collecting digital evidence from a running computer involved in a cybercrime, the forensic investigator makes a list of items that need to be collected.

Which piece of digital evidence should be collected first?

Options:

A.

Security logs

B.

Chat room logs

C.

Recently accessed files

D.

Temporary Internet files

Question 2

Which method of copying digital evidence ensures proper evidence collection?

Options:

A.

File-level copy

B.

Bit-level copy

C.

Cloud backup

D.

Encrypted transfer

Question 3

Which tool should a forensic investigator use to determine whether data are leaving an organization through steganographic methods?

Options:

A.

Data Encryption Standard (DES)

B.

MP3Stego

C.

Netstat

D.

Forensic Toolkit (FTK)

Question 4

A police detective investigating a threat traces the source to a house. The couple at the house shows the detective the only computer the family owns, which is in their son's bedroom. The couple states that their son is presently in class at a local middle school.

How should the detective legally gain access to the computer?

Options:

A.

Obtain consent to search from the parents

B.

Wait for the son to return and ask for consent

C.

Search immediately without consent due to emergency

D.

Get a warrant without consent

Question 5

Which type of information does a Windows SAM file contain?

Options:

A.

Hash of network passwords

B.

Encrypted network passwords

C.

Hash of local Windows passwords

D.

Encrypted local Windows passwords

Question 6

Which Windows component is responsible for reading the boot.ini file and displaying the boot loader menu on Windows XP during the boot process?

Options:

A.

BOOTMGR

B.

NTLDR

C.

Winload.exe

D.

BCD

Question 7

Which method is used to implement steganography through pictures?

Options:

A.

Metadata alteration

B.

Least Significant Bit (LSB) insertion

C.

Encrypting image pixels

D.

File compression

Question 8

A forensic examiner is reviewing a laptop running OS X which has been compromised. The examiner wants to know if any shell commands were executed by any of the accounts.

Which log file or folder should be reviewed?

Options:

A.

/var/vm

B.

/Users//.bash_history

C.

/var/log

D.

/Users//Library/Preferences

Question 9

A forensic investigator is acquiring evidence from an iPhone.

What should the investigator ensure before the iPhone is connected to the computer?

Options:

A.

That the phone is in jailbreak mode

B.

That the phone avoids syncing with the computer

C.

That the phone is powered off

D.

That the phone has root privilege

Question 10

A forensic investigator wants to collect evidence from a file created by a Macintosh computer running OS X 10.8.

Which file type can be created by this OS?

Options:

A.

ReiserFS

B.

MFS

C.

HFS+

D.

NTFS

Question 11

A USB flash drive was seized as evidence to be entered into a trial.

Which type of evidence is this USB flash drive?

Options:

A.

Documentary

B.

Demonstrative

C.

Testimonial

D.

Real

Question 12

Which file system is supported by Mac?

Options:

A.

NTFS

B.

EXT4

C.

Hierarchical File System Plus (HFS+)

D.

FAT32

Question 13

Which U.S. law protects journalists from turning over their work or sources to law enforcement before the information is shared with the public?

Options:

A.

The Privacy Protection Act (PPA)

B.

Health Insurance Portability and Accountability Act (HIPAA)

C.

Electronic Communications Privacy Act (ECPA)

D.

Communications Assistance to Law Enforcement Act (CALEA)

Question 14

A victim of Internet fraud fell for an online offer after using a search engine to find a deal on an expensive software purchase. Once the victim learned about the fraud, he contacted a forensic investigator for help.

Which digital evidence should the investigator collect?

Options:

A.

Virus signatures

B.

Whois records

C.

Computer logs

D.

Email headers

Question 15

How is the Windows swap file, also known as page file, used?

Options:

A.

Replaces bad sectors

B.

Primarily for security

C.

Augments the RAM

D.

Reserved for system files

Question 16

An organization is determined to prevent data leakage through steganography. It has developed a workflow that all outgoing data must pass through. The company will implement a tool as part of the workflow to check for hidden data.

Which tool should be used to check for the existence of steganographically hidden data?

Options:

A.

Data Doctor

B.

Forensic Toolkit (FTK)

C.

Snow

D.

MP3Stego

Question 17

An organization has identified a system breach and has collected volatile data from the system.

Which evidence type should be collected next?

Options:

A.

Running processes

B.

Network connections

C.

Temporary data

D.

File timestamps

Question 18

What are the three basic tasks that a systems forensic specialist must keep in mind when handling evidence during a cybercrime investigation?

Options:

A.

Find evidence, preserve evidence, and prepare evidence

B.

Find evidence, analyze evidence, and prosecute evidence

C.

Preserve evidence, encrypt evidence, and delete evidence

D.

Analyze evidence, prepare evidence, and document evidence

Question 19

Which information is included in an email header?

Options:

A.

Sender's MAC address

B.

Number of pages

C.

Content-Type

D.

Message-Digest

Question 20

An organization believes that a company-owned mobile phone has been compromised.

Which software should be used to collect an image of the phone as digital evidence?

Options:

A.

PTFinder

B.

Forensic SIM Cloner

C.

Forensic Toolkit (FTK)

D.

Data Doctor

Question 21

A forensic scientist is examining a computer for possible evidence of a cybercrime.

Why should the forensic scientist copy files at the bit level instead of the OS level when copying files from the computer to a forensic computer?

Options:

A.

Copying files at the OS level fails to copy deleted files or slack space.

B.

Copying files at the OS level takes too long to be practical.

C.

Copying files at the OS level changes the timestamp of the files.

D.

Copying files at the OS level will copy extra information that is unnecessary.

Question 22

A forensic scientist arrives at a crime scene to begin collecting evidence.

What is the first thing the forensic scientist should do?

Options:

A.

Seize the computer immediately

B.

Photograph all evidence in its original place

C.

Document user passwords

D.

Run antivirus scans

Page: 1 / 7
Total 74 questions