Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

Pass the WGU Courses and Certificates Digital-Forensics-in-Cybersecurity Questions and answers with ValidTests

Exam Digital-Forensics-in-Cybersecurity All Questions
Exam Digital-Forensics-in-Cybersecurity Premium Access

View all detail and faqs for the Digital-Forensics-in-Cybersecurity exam

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which United States law requires telecommunications equipment manufacturers to provide built-in surveillance capabilities for federal agencies?

Options:

A.

Health Insurance Portability and Accountability Act (HIPAA)

B.

Communications Assistance to Law Enforcement Act (CALEA)

C.

Electronic Communications Privacy Act (ECPA)

D.

The Privacy Protection Act (PPA)

Expert Solution
Questions # 2:

Which method is used to implement steganography through pictures?

Options:

A.

Metadata alteration

B.

Least Significant Bit (LSB) insertion

C.

Encrypting image pixels

D.

File compression

Expert Solution
Questions # 3:

An organization is determined to prevent data leakage through steganography. It has developed a workflow that all outgoing data must pass through. The company will implement a tool as part of the workflow to check for hidden data.

Which tool should be used to check for the existence of steganographically hidden data?

Options:

A.

Data Doctor

B.

Forensic Toolkit (FTK)

C.

Snow

D.

MP3Stego

Expert Solution
Questions # 4:

Thomas received an email stating he needed to follow a link and verify his bank account information to ensure it was secure. Shortly after following the instructions, Thomas noticed money was missing from his account.

Which digital evidence should be considered to determine how Thomas' account information was compromised?

Options:

A.

Email messages

B.

Browser cache

C.

Bank transaction logs

D.

Firewall logs

Expert Solution
Questions # 5:

Tom saved a message using the least significant bit (LSB) method in a sound file and uploaded this sound to his own website.

What is the carrier in this example?

Options:

A.

The least significant bit method

B.

Tom's website

C.

The sound file

D.

The message

Expert Solution
Questions # 6:

How is the Windows swap file, also known as page file, used?

Options:

A.

Replaces bad sectors

B.

Primarily for security

C.

Augments the RAM

D.

Reserved for system files

Expert Solution
Questions # 7:

Which tool identifies the presence of steganography?

Options:

A.

Disk Investigator

B.

DiskDigger

C.

Forensic Toolkit (FTK)

D.

ComputerCOP

Expert Solution
Questions # 8:

The chief information security officer of a company believes that an attacker has infiltrated the company's network and is using steganography to communicate with external sources. A security team is investigating the incident. They are told to start by focusing on the core elements of steganography.

What are the core elements of steganography?

Options:

A.

Payload, carrier, channel

B.

Encryption, decryption, key

C.

File, metadata, header

D.

Hash, nonce, salt

Expert Solution
Questions # 9:

A computer involved in a crime is infected with malware. The computer is on and connected to the company's network. The forensic investigator arrives at the scene.

Which action should be the investigator's first step?

Options:

A.

Turn off the computer

B.

Unplug the computer's Ethernet cable

C.

Run malware removal tools

D.

Copy files to external media

Expert Solution
Questions # 10:

Which law includes a provision permitting the wiretapping of VoIP calls?

Options:

A.

Communications Assistance to Law Enforcement Act (CALEA)

B.

Electronic Communications Privacy Act (ECPA)

C.

Health Insurance Portability and Accountability Act (HIPAA)

D.

Stored Communications Act

Expert Solution
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions