Pass the WGU Courses and Certificates Digital-Forensics-in-Cybersecurity Questions and answers with CertsForce

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

An employee sends an email message to a fellow employee. The message is sent through the company's messaging server.

Which protocol is used to send the email message?

Options:

A.

SNMP


B.

IMAP


C.

POP3


D.

SMTP


Expert Solution
Questions # 2:

How do forensic specialists show that digital evidence was handled in a protected, secure manner during the process of collecting and analyzing the evidence?

Options:

A.

By encrypting all evidence


B.

By maintaining the chain of custody


C.

By deleting temporary files


D.

By performing backups


Expert Solution
Questions # 3:

Which tool can be used to make a bit-by-bit copy of a Windows Phone 8?

Options:

A.

Forensic Toolkit (FTK)


B.

Data Doctor


C.

Pwnage


D.

Wolf


Expert Solution
Questions # 4:

While collecting digital evidence from a running computer involved in a cybercrime, the forensic investigator makes a list of items that need to be collected.

Which piece of digital evidence should be collected first?

Options:

A.

Security logs


B.

Chat room logs


C.

Recently accessed files


D.

Temporary Internet files


Expert Solution
Questions # 5:

A forensic investigator needs to identify where email messages are stored on a Microsoft Exchange server.

Which file extension is used by Exchange email servers to store the mailbox database?

Options:

A.

.edb


B.

.nsf


C.

.mail


D.

.db


Expert Solution
Questions # 6:

Which storage format is a magnetic drive?

Options:

A.

CD-ROM


B.

SATA


C.

Blu-ray


D.

SSD


Expert Solution
Questions # 7:

Which tool should a forensic investigator use to determine whether data are leaving an organization through steganographic methods?

Options:

A.

Data Encryption Standard (DES)


B.

MP3Stego


C.

Netstat


D.

Forensic Toolkit (FTK)


Expert Solution
Questions # 8:

A police detective investigating a threat traces the source to a house. The couple at the house shows the detective the only computer the family owns, which is in their son's bedroom. The couple states that their son is presently in class at a local middle school.

How should the detective legally gain access to the computer?

Options:

A.

Obtain consent to search from the parents


B.

Wait for the son to return and ask for consent


C.

Search immediately without consent due to emergency


D.

Get a warrant without consent


Expert Solution
Questions # 9:

Which description applies to the Advanced Forensic Format (AFF)?

Options:

A.

An open file standard developed by AccessData


B.

A proprietary format used by the iLook tool


C.

An open file standard used by Sleuth Kit and Autopsy


D.

A proprietary format developed by Guidance Software


Expert Solution
Questions # 10:

A computer involved in a crime is infected with malware. The computer is on and connected to the company's network. The forensic investigator arrives at the scene.

Which action should be the investigator's first step?

Options:

A.

Turn off the computer


B.

Unplug the computer's Ethernet cable


C.

Run malware removal tools


D.

Copy files to external media


Expert Solution
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions