View all detail and faqs for the Digital-Forensics-in-Cybersecurity exam
After a company's single-purpose, dedicated messaging server is hacked by a cybercriminal, a forensics expert is hired to investigate the crime and collect evidence.
Which digital evidence should be collected?
Which policy is included in the CAN-SPAM Act?
Which tool should be used with sound files, video files, and image files?
An organization believes that a company-owned mobile phone has been compromised.
Which software should be used to collect an image of the phone as digital evidence?
A forensic specialist is about to collect digital evidence from a suspect's computer hard drive. The computer is off.
What should be the specialist's first step?
Which law requires a search warrant or one of the recognized exceptions to search warrant requirements for searching email messages on a computer?
Which storage format is a magnetic drive?
Which tool can be used to make a bit-by-bit copy of a Windows Phone 8?
Which U.S. law criminalizes the act of knowingly using a misleading domain name with the intent to deceive a minor into viewing harmful material?
Which type of storage format should be transported in a special bag to reduce electrostatic interference?