New Year Sale Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

WGU Digital-Forensics-in-Cybersecurity Dumps

Digital Forensics in Cybersecurity (D431/C840DQO1) Course Exam Questions and Answers

Question 1

Which method is used to implement steganography through pictures?

Options:

A.

Metadata alteration

B.

Least Significant Bit (LSB) insertion

C.

Encrypting image pixels

D.

File compression

Question 2

A forensic scientist is examining a computer for possible evidence of a cybercrime.

Why should the forensic scientist copy files at the bit level instead of the OS level when copying files from the computer to a forensic computer?

Options:

A.

Copying files at the OS level fails to copy deleted files or slack space.

B.

Copying files at the OS level takes too long to be practical.

C.

Copying files at the OS level changes the timestamp of the files.

D.

Copying files at the OS level will copy extra information that is unnecessary.

Question 3

Which file stores local Windows passwords in the Windows\System32\ directory and is subject to being cracked by using a live CD?

Options:

A.

SAM

B.

IPSec

C.

HAL

D.

Ntidr

Question 4

On which file does the Windows operating system store hashed passwords?

Options:

A.

SAM

B.

Kerberos

C.

System

D.

NTUSER.dat

Question 5

Which storage format is a magnetic drive?

Options:

A.

CD-ROM

B.

SATA

C.

Blu-ray

D.

SSD

Question 6

Which description applies to the Advanced Forensic Format (AFF)?

Options:

A.

An open file standard developed by AccessData

B.

A proprietary format used by the iLook tool

C.

An open file standard used by Sleuth Kit and Autopsy

D.

A proprietary format developed by Guidance Software

Question 7

A digital forensic examiner receives a computer used in a hacking case. The examiner is asked to extract information from the computer's Registry.

How should the examiner proceed when obtaining the requested digital evidence?

Options:

A.

Ensure that any tools and techniques used are widely accepted

B.

Investigate whether the computer was properly seized

C.

Enlist a colleague to witness the investigative process

D.

Download a tool from a hacking website to extract the data

Question 8

A computer involved in a crime is infected with malware. The computer is on and connected to the company's network. The forensic investigator arrives at the scene.

Which action should be the investigator's first step?

Options:

A.

Turn off the computer

B.

Unplug the computer's Ethernet cable

C.

Run malware removal tools

D.

Copy files to external media

Question 9

The following line of code is an example of how to make a forensic copy of a suspect drive:

dd if=/dev/mem of=/evidence/image.memory1

Which operating system should be used to run this command?

Options:

A.

Windows

B.

Linux

C.

MacOS

D.

Unix

Question 10

Which law is related to the disclosure of personally identifiable protected health information (PHI)?

Options:

A.

The Privacy Protection Act (PPA)

B.

Health Insurance Portability and Accountability Act (HIPAA)

C.

Electronic Communications Privacy Act (ECPA)

D.

Communications Assistance to Law Enforcement Act (CALEA)

Question 11

What are the three basic tasks that a systems forensic specialist must keep in mind when handling evidence during a cybercrime investigation?

Options:

A.

Find evidence, preserve evidence, and prepare evidence

B.

Find evidence, analyze evidence, and prosecute evidence

C.

Preserve evidence, encrypt evidence, and delete evidence

D.

Analyze evidence, prepare evidence, and document evidence

Question 12

A forensic scientist arrives at a crime scene to begin collecting evidence.

What is the first thing the forensic scientist should do?

Options:

A.

Seize the computer immediately

B.

Photograph all evidence in its original place

C.

Document user passwords

D.

Run antivirus scans

Question 13

Which operating system creates a swap file to temporarily store information from memory on the hard drive when needed?

Options:

A.

Linux

B.

Mac

C.

Unix

D.

Windows

Question 14

Which technique allows a cybercriminal to hide information?

Options:

A.

Steganalysis

B.

Steganography

C.

Encryption

D.

Cryptography

Question 15

Which U.S. law criminalizes the act of knowingly using a misleading domain name with the intent to deceive a minor into viewing harmful material?

Options:

A.

Communications Assistance to Law Enforcement Act (CALEA)

B.

18 U.S.C. 2252B

C.

The Privacy Protection Act (PPA)

D.

Electronic Communications Privacy Act (ECPA)

Question 16

An employee sends an email message to a fellow employee. The message is sent through the company's messaging server.

Which protocol is used to send the email message?

Options:

A.

SNMP

B.

IMAP

C.

POP3

D.

SMTP

Question 17

Which tool should be used with sound files, video files, and image files?

Options:

A.

Snow

B.

MP3Stego

C.

StegVideo

D.

Stealth Files 4

Question 18

A cybercriminal communicates with his compatriots using steganography. The FBI discovers that the criminal group uses white space to hide data in photographs.

Which tool can the cybercriminals use to facilitate this type of communication?

Options:

A.

Steganophony

B.

Wolf

C.

Snow

D.

QuickStego

Question 19

Which characteristic applies to magnetic drives compared to solid-state drives (SSDs)?

Options:

A.

Higher cost

B.

Lower cost

C.

Less susceptible to damage

D.

Faster read/write speeds

Question 20

Which Windows 7 operating system log stores events collected from remote computers?

Options:

A.

System

B.

Application

C.

ForwardedEvents

D.

Security

Question 21

A forensic investigator wants to collect evidence from a file created by a Macintosh computer running OS X 10.8.

Which file type can be created by this OS?

Options:

A.

ReiserFS

B.

MFS

C.

HFS+

D.

NTFS

Question 22

What is one purpose of steganography?

Options:

A.

To encrypt data for security

B.

To deliver information secretly

C.

To compress large files

D.

To delete files securely

Question 23

An employee is suspected of using a company Apple iPhone 4 for inappropriate activities.

Which utility should the company use to access the iPhone without knowing the passcode?

Options:

A.

Data Doctor

B.

Forensic Toolkit (FTK)

C.

Device Seizure

D.

Autopsy

Page: 1 / 8
Total 79 questions