Big Black Friday Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

WGU Digital-Forensics-in-Cybersecurity Digital Forensics in Cybersecurity (D431/C840DQO1) Course Exam Exam Practice Test

Digital Forensics in Cybersecurity (D431/C840DQO1) Course Exam Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

Susan was looking at her credit report and noticed that several new credit cards had been opened lately in her name. Susan has not opened any of the credit card accounts herself.

Which type of cybercrime has been perpetrated against Susan?

Options:

A.

Identity theft

B.

SQL injection

C.

Cyberstalking

D.

Malware

Question 2

A forensic investigator needs to know which file type to look for in order to find emails from a specific client.

Which file extension is used by Eudora?

Options:

A.

.dbx

B.

.ost

C.

.pst

D.

.mbx

Question 3

Which universal principle must be observed when handling digital evidence?

Options:

A.

Avoid making changes to the evidence

B.

Make a copy and analyze the original

C.

Get the signatures of two witnesses

D.

Keep the evidence in a plastic bag

Question 4

An employee sends an email message to a fellow employee. The message is sent through the company's messaging server.

Which protocol is used to send the email message?

Options:

A.

SNMP

B.

IMAP

C.

POP3

D.

SMTP

Question 5

Which file system is supported by Mac?

Options:

A.

NTFS

B.

EXT4

C.

Hierarchical File System Plus (HFS+)

D.

FAT32

Question 6

An organization has identified a system breach and has collected volatile data from the system.

Which evidence type should be collected next?

Options:

A.

Running processes

B.

Network connections

C.

Temporary data

D.

File timestamps

Question 7

Which type of information does a Windows SAM file contain?

Options:

A.

Hash of network passwords

B.

Encrypted network passwords

C.

Hash of local Windows passwords

D.

Encrypted local Windows passwords

Question 8

The chief information officer of an accounting firm believes sensitive data is being exposed on the local network.

Which tool should the IT staff use to gather digital evidence about this security vulnerability?

Options:

A.

Firewall

B.

Sniffer

C.

Antivirus

D.

Packet filter

Question 9

Which description applies to the Advanced Forensic Format (AFF)?

Options:

A.

An open file standard developed by AccessData

B.

A proprietary format used by the iLook tool

C.

An open file standard used by Sleuth Kit and Autopsy

D.

A proprietary format developed by Guidance Software

Question 10

The chief executive officer (CEO) of a small computer company has identified a potential hacking attack from an outside competitor.

Which type of evidence should a forensics investigator use to identify the source of the hack?

Options:

A.

Network transaction logs

B.

Email archives

C.

File system metadata

D.

Browser history

Question 11

An organization is determined to prevent data leakage through steganography. It has developed a workflow that all outgoing data must pass through. The company will implement a tool as part of the workflow to check for hidden data.

Which tool should be used to check for the existence of steganographically hidden data?

Options:

A.

Data Doctor

B.

Forensic Toolkit (FTK)

C.

Snow

D.

MP3Stego

Question 12

A USB flash drive was seized as evidence to be entered into a trial.

Which type of evidence is this USB flash drive?

Options:

A.

Documentary

B.

Demonstrative

C.

Testimonial

D.

Real

Question 13

A cybercriminal communicates with his compatriots using steganography. The FBI discovers that the criminal group uses white space to hide data in photographs.

Which tool can the cybercriminals use to facilitate this type of communication?

Options:

A.

Steganophony

B.

Wolf

C.

Snow

D.

QuickStego

Question 14

Which law or guideline lists the four states a mobile device can be in when data is extracted from it?

Options:

A.

Health Insurance Portability and Accountability Act (HIPAA)

B.

NIST SP 800-72 Guidelines

C.

Electronic Communications Privacy Act (ECPA)

D.

Communications Assistance to Law Enforcement Act (CALEA)

Question 15

Which operating system (OS) uses the NTFS (New Technology File System) file operating system?

Options:

A.

Linux

B.

Mac OS X v10.5

C.

Mac OS X v10.4

D.

Windows 8

Question 16

Which principle of evidence collection states that access to evidence must be tracked from the time it is seized through its use in court?

Options:

A.

Evidence record

B.

Chain of custody

C.

Event log

D.

Audit log

Question 17

After a company's single-purpose, dedicated messaging server is hacked by a cybercriminal, a forensics expert is hired to investigate the crime and collect evidence.

Which digital evidence should be collected?

Options:

A.

Server configuration files

B.

Firewall logs

C.

Email contents

D.

User login credentials

Question 18

What are the three basic tasks that a systems forensic specialist must keep in mind when handling evidence during a cybercrime investigation?

Options:

A.

Find evidence, preserve evidence, and prepare evidence

B.

Find evidence, analyze evidence, and prosecute evidence

C.

Preserve evidence, encrypt evidence, and delete evidence

D.

Analyze evidence, prepare evidence, and document evidence

Question 19

A computer involved in a crime is infected with malware. The computer is on and connected to the company's network. The forensic investigator arrives at the scene.

Which action should be the investigator's first step?

Options:

A.

Turn off the computer

B.

Unplug the computer's Ethernet cable

C.

Run malware removal tools

D.

Copy files to external media

Question 20

Which directory contains the system's configuration files on a computer running Mac OS X?

Options:

A.

/var

B.

/bin

C.

/etc

D.

/cfg

Question 21

Which law requires both parties to consent to the recording of a conversation?

Options:

A.

Health Insurance Portability and Accountability Act (HIPAA)

B.

Electronic Communications Privacy Act (ECPA)

C.

Wiretap Act

D.

Stored Communications Act

Question 22

While collecting digital evidence from a running computer involved in a cybercrime, the forensic investigator makes a list of items that need to be collected.

Which piece of digital evidence should be collected first?

Options:

A.

Security logs

B.

Chat room logs

C.

Recently accessed files

D.

Temporary Internet files

Question 23

Which policy is included in the CAN-SPAM Act?

Options:

A.

Email sender must provide a method for recipients to opt out of future emails without charge

B.

Email sender must encrypt all outgoing emails

C.

Email sender must verify the recipient’s consent before sending

D.

Email sender must include recipient IP address in the email header