Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the WGU Courses and Certificates Digital-Forensics-in-Cybersecurity Questions and answers with Dumpstech

Exam Digital-Forensics-in-Cybersecurity Premium Access

View all detail and faqs for the Digital-Forensics-in-Cybersecurity exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
Questions # 11:

Susan was looking at her credit report and noticed that several new credit cards had been opened lately in her name. Susan has not opened any of the credit card accounts herself.

Which type of cybercrime has been perpetrated against Susan?

Options:

A.

Identity theft

B.

SQL injection

C.

Cyberstalking

D.

Malware

Questions # 12:

Which U.S. law criminalizes the act of knowingly using a misleading domain name with the intent to deceive a minor into viewing harmful material?

Options:

A.

Communications Assistance to Law Enforcement Act (CALEA)

B.

18 U.S.C. 2252B

C.

The Privacy Protection Act (PPA)

D.

Electronic Communications Privacy Act (ECPA)

Questions # 13:

The human resources manager of a small accounting firm believes he may have been a victim of a phishing scam. The manager clicked on a link in an email message that asked him to verify the logon credentials for the firm's online bank account.

Which digital evidence should a forensic investigator collect to investigate this incident?

Options:

A.

Email headers

B.

Browser cache

C.

System logs

D.

Network traffic logs

Questions # 14:

How should a forensic scientist obtain the network configuration from a Windows PC before seizing it from a crime scene?

Options:

A.

By checking the system properties

B.

By using the ipconfig command from a command prompt on the computer

C.

By opening the Network and Sharing Center

D.

By rebooting the computer into safe mode

Questions # 15:

The chief information officer of an accounting firm believes sensitive data is being exposed on the local network.

Which tool should the IT staff use to gather digital evidence about this security vulnerability?

Options:

A.

Firewall

B.

Sniffer

C.

Antivirus

D.

Packet filter

Questions # 16:

A forensic investigator is acquiring evidence from an iPhone.

What should the investigator ensure before the iPhone is connected to the computer?

Options:

A.

That the phone is in jailbreak mode

B.

That the phone avoids syncing with the computer

C.

That the phone is powered off

D.

That the phone has root privilege

Questions # 17:

A USB flash drive was seized as evidence to be entered into a trial.

Which type of evidence is this USB flash drive?

Options:

A.

Documentary

B.

Demonstrative

C.

Testimonial

D.

Real

Questions # 18:

Which characteristic applies to magnetic drives compared to solid-state drives (SSDs)?

Options:

A.

Higher cost

B.

Lower cost

C.

Less susceptible to damage

D.

Faster read/write speeds

Questions # 19:

A forensic scientist is examining a computer for possible evidence of a cybercrime.

Why should the forensic scientist copy files at the bit level instead of the OS level when copying files from the computer to a forensic computer?

Options:

A.

Copying files at the OS level fails to copy deleted files or slack space.

B.

Copying files at the OS level takes too long to be practical.

C.

Copying files at the OS level changes the timestamp of the files.

D.

Copying files at the OS level will copy extra information that is unnecessary.

Questions # 20:

A police detective investigating a threat traces the source to a house. The couple at the house shows the detective the only computer the family owns, which is in their son's bedroom. The couple states that their son is presently in class at a local middle school.

How should the detective legally gain access to the computer?

Options:

A.

Obtain consent to search from the parents

B.

Wait for the son to return and ask for consent

C.

Search immediately without consent due to emergency

D.

Get a warrant without consent

Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions