New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the WGU Courses and Certificates Digital-Forensics-in-Cybersecurity Questions and answers with CertsForce

Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
Questions # 11:

Which U.S. law protects journalists from turning over their work or sources to law enforcement before the information is shared with the public?

Options:

A.

The Privacy Protection Act (PPA)


B.

Health Insurance Portability and Accountability Act (HIPAA)


C.

Electronic Communications Privacy Act (ECPA)


D.

Communications Assistance to Law Enforcement Act (CALEA)


Expert Solution
Questions # 12:

How should a forensic scientist obtain the network configuration from a Windows PC before seizing it from a crime scene?

Options:

A.

By checking the system properties


B.

By using the ipconfig command from a command prompt on the computer


C.

By opening the Network and Sharing Center


D.

By rebooting the computer into safe mode


Expert Solution
Questions # 13:

Which term describes the used space between the end of a file and the end of the last cluster assigned to the file?

Options:

A.

Unallocated space


B.

Volume slack


C.

Host protected area


D.

File slack


Expert Solution
Questions # 14:

Which method of copying digital evidence ensures proper evidence collection?

Options:

A.

File-level copy


B.

Bit-level copy


C.

Cloud backup


D.

Encrypted transfer


Expert Solution
Questions # 15:

The human resources manager of a small accounting firm believes he may have been a victim of a phishing scam. The manager clicked on a link in an email message that asked him to verify the logon credentials for the firm's online bank account.

Which digital evidence should a forensic investigator collect to investigate this incident?

Options:

A.

Email headers


B.

Browser cache


C.

System logs


D.

Network traffic logs


Expert Solution
Questions # 16:

After a company's single-purpose, dedicated messaging server is hacked by a cybercriminal, a forensics expert is hired to investigate the crime and collect evidence.

Which digital evidence should be collected?

Options:

A.

Server configuration files


B.

Firewall logs


C.

Email contents


D.

User login credentials


Expert Solution
Questions # 17:

A forensic investigator is acquiring evidence from an iPhone.

What should the investigator ensure before the iPhone is connected to the computer?

Options:

A.

That the phone is in jailbreak mode


B.

That the phone avoids syncing with the computer


C.

That the phone is powered off


D.

That the phone has root privilege


Expert Solution
Questions # 18:

What is one purpose of steganography?

Options:

A.

To encrypt data for security


B.

To deliver information secretly


C.

To compress large files


D.

To delete files securely


Expert Solution
Questions # 19:

Which law requires a search warrant or one of the recognized exceptions to search warrant requirements for searching email messages on a computer?

Options:

A.

The Fourth Amendment to the U.S. Constitution


B.

Electronic Communications Privacy Act (ECPA)


C.

Stored Communications Act


D.

Communications Assistance to Law Enforcement Act (CALEA)


Expert Solution
Questions # 20:

Which tool identifies the presence of steganography?

Options:

A.

Disk Investigator


B.

DiskDigger


C.

Forensic Toolkit (FTK)


D.

ComputerCOP


Expert Solution
Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions