New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the WGU Courses and Certificates Digital-Forensics-in-Cybersecurity Questions and answers with CertsForce

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

How do forensic specialists show that digital evidence was handled in a protected, secure manner during the process of collecting and analyzing the evidence?

Options:

A.

By encrypting all evidence


B.

By maintaining the chain of custody


C.

By deleting temporary files


D.

By performing backups


Expert Solution
Questions # 2:

While collecting digital evidence from a running computer involved in a cybercrime, the forensic investigator makes a list of items that need to be collected.

Which piece of digital evidence should be collected first?

Options:

A.

Security logs


B.

Chat room logs


C.

Recently accessed files


D.

Temporary Internet files


Expert Solution
Questions # 3:

Which universal principle must be observed when handling digital evidence?

Options:

A.

Avoid making changes to the evidence


B.

Make a copy and analyze the original


C.

Get the signatures of two witnesses


D.

Keep the evidence in a plastic bag


Expert Solution
Questions # 4:

Which tool should a forensic investigator use to determine whether data are leaving an organization through steganographic methods?

Options:

A.

Data Encryption Standard (DES)


B.

MP3Stego


C.

Netstat


D.

Forensic Toolkit (FTK)


Expert Solution
Questions # 5:

Which characteristic applies to solid-state drives (SSDs) compared to magnetic drives?

Options:

A.

They are less susceptible to damage


B.

They have moving parts


C.

They are generally slower


D.

They have a lower cost per gigabyte


Expert Solution
Questions # 6:

An employee sends an email message to a fellow employee. The message is sent through the company's messaging server.

Which protocol is used to send the email message?

Options:

A.

SNMP


B.

IMAP


C.

POP3


D.

SMTP


Expert Solution
Questions # 7:

An organization is determined to prevent data leakage through steganography. It has developed a workflow that all outgoing data must pass through. The company will implement a tool as part of the workflow to check for hidden data.

Which tool should be used to check for the existence of steganographically hidden data?

Options:

A.

Data Doctor


B.

Forensic Toolkit (FTK)


C.

Snow


D.

MP3Stego


Expert Solution
Questions # 8:

An organization has identified a system breach and has collected volatile data from the system.

Which evidence type should be collected next?

Options:

A.

Running processes


B.

Network connections


C.

Temporary data


D.

File timestamps


Expert Solution
Questions # 9:

Which technique allows a cybercriminal to hide information?

Options:

A.

Steganalysis


B.

Steganography


C.

Encryption


D.

Cryptography


Expert Solution
Questions # 10:

Which information is included in an email header?

Options:

A.

Sender's MAC address


B.

Number of pages


C.

Content-Type


D.

Message-Digest


Expert Solution
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions