Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the WGU Courses and Certificates Digital-Forensics-in-Cybersecurity Questions and answers with ValidTests

Exam Digital-Forensics-in-Cybersecurity All Questions
Exam Digital-Forensics-in-Cybersecurity Premium Access

View all detail and faqs for the Digital-Forensics-in-Cybersecurity exam

Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
Questions # 11:

After a company's single-purpose, dedicated messaging server is hacked by a cybercriminal, a forensics expert is hired to investigate the crime and collect evidence.

Which digital evidence should be collected?

Options:

A.

Server configuration files

B.

Firewall logs

C.

Email contents

D.

User login credentials

Expert Solution
Questions # 12:

Which policy is included in the CAN-SPAM Act?

Options:

A.

Email sender must provide a method for recipients to opt out of future emails without charge

B.

Email sender must encrypt all outgoing emails

C.

Email sender must verify the recipient’s consent before sending

D.

Email sender must include recipient IP address in the email header

Expert Solution
Questions # 13:

Which tool should be used with sound files, video files, and image files?

Options:

A.

Snow

B.

MP3Stego

C.

StegVideo

D.

Stealth Files 4

Expert Solution
Questions # 14:

An organization believes that a company-owned mobile phone has been compromised.

Which software should be used to collect an image of the phone as digital evidence?

Options:

A.

PTFinder

B.

Forensic SIM Cloner

C.

Forensic Toolkit (FTK)

D.

Data Doctor

Expert Solution
Questions # 15:

A forensic specialist is about to collect digital evidence from a suspect's computer hard drive. The computer is off.

What should be the specialist's first step?

Options:

A.

Carefully review the chain of custody form.

B.

Turn the computer on and remove any malware.

C.

Make a forensic copy of the computer's hard drive.

D.

Turn the computer on and photograph the desktop.

Expert Solution
Questions # 16:

Which law requires a search warrant or one of the recognized exceptions to search warrant requirements for searching email messages on a computer?

Options:

A.

The Fourth Amendment to the U.S. Constitution

B.

Electronic Communications Privacy Act (ECPA)

C.

Stored Communications Act

D.

Communications Assistance to Law Enforcement Act (CALEA)

Expert Solution
Questions # 17:

Which storage format is a magnetic drive?

Options:

A.

CD-ROM

B.

SATA

C.

Blu-ray

D.

SSD

Expert Solution
Questions # 18:

Which tool can be used to make a bit-by-bit copy of a Windows Phone 8?

Options:

A.

Forensic Toolkit (FTK)

B.

Data Doctor

C.

Pwnage

D.

Wolf

Expert Solution
Questions # 19:

Which U.S. law criminalizes the act of knowingly using a misleading domain name with the intent to deceive a minor into viewing harmful material?

Options:

A.

Communications Assistance to Law Enforcement Act (CALEA)

B.

18 U.S.C. 2252B

C.

The Privacy Protection Act (PPA)

D.

Electronic Communications Privacy Act (ECPA)

Expert Solution
Questions # 20:

Which type of storage format should be transported in a special bag to reduce electrostatic interference?

Options:

A.

Solid-state drives

B.

Magnetic media

C.

Optical discs

D.

Flash drives

Expert Solution
Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions