Pass the WGU Courses and Certificates Digital-Forensics-in-Cybersecurity Questions and answers with CertsForce

Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
Questions # 11:

An organization is determined to prevent data leakage through steganography. It has developed a workflow that all outgoing data must pass through. The company will implement a tool as part of the workflow to check for hidden data.

Which tool should be used to check for the existence of steganographically hidden data?

Options:

A.

Data Doctor


B.

Forensic Toolkit (FTK)


C.

Snow


D.

MP3Stego


Expert Solution
Questions # 12:

A digital forensic examiner receives a computer used in a hacking case. The examiner is asked to extract information from the computer's Registry.

How should the examiner proceed when obtaining the requested digital evidence?

Options:

A.

Ensure that any tools and techniques used are widely accepted


B.

Investigate whether the computer was properly seized


C.

Enlist a colleague to witness the investigative process


D.

Download a tool from a hacking website to extract the data


Expert Solution
Questions # 13:

An organization believes that a company-owned mobile phone has been compromised.

Which software should be used to collect an image of the phone as digital evidence?

Options:

A.

PTFinder


B.

Forensic SIM Cloner


C.

Forensic Toolkit (FTK)


D.

Data Doctor


Expert Solution
Questions # 14:

What are the three basic tasks that a systems forensic specialist must keep in mind when handling evidence during a cybercrime investigation?

Options:

A.

Find evidence, preserve evidence, and prepare evidence


B.

Find evidence, analyze evidence, and prosecute evidence


C.

Preserve evidence, encrypt evidence, and delete evidence


D.

Analyze evidence, prepare evidence, and document evidence


Expert Solution
Questions # 15:

A user at a company attempts to hide the combination to a safe that stores confidential information in a data file called vacationdetails.doc.

What is vacationdetails.doc called, in steganographic terms?

Options:

A.

Payload


B.

Snow


C.

Carrier


D.

Channel


Expert Solution
Questions # 16:

Which policy is included in the CAN-SPAM Act?

Options:

A.

Email sender must provide a method for recipients to opt out of future emails without charge


B.

Email sender must encrypt all outgoing emails


C.

Email sender must verify the recipient’s consent before sending


D.

Email sender must include recipient IP address in the email header


Expert Solution
Questions # 17:

Which file system is supported by Mac?

Options:

A.

NTFS


B.

EXT4


C.

Hierarchical File System Plus (HFS+)


D.

FAT32


Expert Solution
Questions # 18:

Which operating system creates a swap file to temporarily store information from memory on the hard drive when needed?

Options:

A.

Linux


B.

Mac


C.

Unix


D.

Windows


Expert Solution
Questions # 19:

Which law requires both parties to consent to the recording of a conversation?

Options:

A.

Health Insurance Portability and Accountability Act (HIPAA)


B.

Electronic Communications Privacy Act (ECPA)


C.

Wiretap Act


D.

Stored Communications Act


Expert Solution
Questions # 20:

A cybercriminal hacked into an Apple iPad that belongs to a company's chief executive officer (CEO). The cybercriminal deleted some important files on the data volume that must be retrieved.

Which hidden folder will contain the digital evidence?

Options:

A.

/Private/etc


B.

/lost+found


C.

/.Trashes/501


D.

/etc


Expert Solution
Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions