New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the WGU Courses and Certificates Digital-Forensics-in-Cybersecurity Questions and answers with Dumpstech

Exam Digital-Forensics-in-Cybersecurity Premium Access

View all detail and faqs for the Digital-Forensics-in-Cybersecurity exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which storage format is a magnetic drive?

Options:

A.

CD-ROM

B.

SATA

C.

Blu-ray

D.

SSD

Questions # 2:

Which Windows component is responsible for reading the boot.ini file and displaying the boot loader menu on Windows XP during the boot process?

Options:

A.

BOOTMGR

B.

NTLDR

C.

Winload.exe

D.

BCD

Questions # 3:

The chief executive officer (CEO) of a small computer company has identified a potential hacking attack from an outside competitor.

Which type of evidence should a forensics investigator use to identify the source of the hack?

Options:

A.

Network transaction logs

B.

Email archives

C.

File system metadata

D.

Browser history

Questions # 4:

A company has identified that a hacker has modified files on one of the company's computers. The IT department has collected the storage media from the hacked computer.

Which evidence should be obtained from the storage media to identify which files were modified?

Options:

A.

File timestamps

B.

Private IP addresses

C.

Public IP addresses

D.

Operating system version

Questions # 5:

Which method of copying digital evidence ensures proper evidence collection?

Options:

A.

File-level copy

B.

Bit-level copy

C.

Cloud backup

D.

Encrypted transfer

Questions # 6:

A cybercriminal hacked into an Apple iPad that belongs to a company's chief executive officer (CEO). The cybercriminal deleted some important files on the data volume that must be retrieved.

Which hidden folder will contain the digital evidence?

Options:

A.

/Private/etc

B.

/lost+found

C.

/.Trashes/501

D.

/etc

Questions # 7:

Which policy is included in the CAN-SPAM Act?

Options:

A.

Email sender must provide a method for recipients to opt out of future emails without charge

B.

Email sender must encrypt all outgoing emails

C.

Email sender must verify the recipient’s consent before sending

D.

Email sender must include recipient IP address in the email header

Questions # 8:

A forensic investigator suspects that spyware has been installed to a Mac OS X computer by way of an update.

Which Mac OS X log or folder stores information about system and software updates?

Options:

A.

/var/spool/cups

B.

/var/log/daily.out

C.

/var/vm

D.

/Library/Receipts

Questions # 9:

Which principle of evidence collection states that access to evidence must be tracked from the time it is seized through its use in court?

Options:

A.

Evidence record

B.

Chain of custody

C.

Event log

D.

Audit log

Questions # 10:

Which rule is used for conducting electronic surveillance?

Options:

A.

All documents related to health informatics should be stored in perpetuity.

B.

All commercial email must provide an opt-out mechanism.

C.

Using a misleading domain name to deceive a person into viewing obscene material shall result in fines or imprisonment.

D.

Telecommunications equipment must have built-in surveillance capabilities for law enforcement.

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions