Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the WGU Courses and Certificates Digital-Forensics-in-Cybersecurity Questions and answers with ValidTests

Exam Digital-Forensics-in-Cybersecurity All Questions
Exam Digital-Forensics-in-Cybersecurity Premium Access

View all detail and faqs for the Digital-Forensics-in-Cybersecurity exam

Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions
Questions # 21:

Which operating system creates a swap file to temporarily store information from memory on the hard drive when needed?

Options:

A.

Linux

B.

Mac

C.

Unix

D.

Windows

Expert Solution
Questions # 22:

Where is the default location for 32-bit programs installed by a user on a 64-bit version of Windows 7?

Options:

A.

C:\ProgramData

B.

C:\Program files

C.

C:\Windows

D.

C:\Program files (x86)

Expert Solution
Questions # 23:

Which law includes a provision permitting the wiretapping of VoIP calls?

Options:

A.

Communications Assistance to Law Enforcement Act (CALEA)

B.

Electronic Communications Privacy Act (ECPA)

C.

Health Insurance Portability and Accountability Act (HIPAA)

D.

Stored Communications Act

Questions # 24:

Which tool identifies the presence of steganography?

Options:

A.

Disk Investigator

B.

DiskDigger

C.

Forensic Toolkit (FTK)

D.

ComputerCOP

Questions # 25:

Which technique allows a cybercriminal to hide information?

Options:

A.

Steganalysis

B.

Steganography

C.

Encryption

D.

Cryptography

Questions # 26:

A computer involved in a crime is infected with malware. The computer is on and connected to the company's network. The forensic investigator arrives at the scene.

Which action should be the investigator's first step?

Options:

A.

Turn off the computer

B.

Unplug the computer's Ethernet cable

C.

Run malware removal tools

D.

Copy files to external media

Questions # 27:

Which type of storage format should be transported in a special bag to reduce electrostatic interference?

Options:

A.

Solid-state drives

B.

Magnetic media

C.

Optical discs

D.

Flash drives

Questions # 28:

How is the Windows swap file, also known as page file, used?

Options:

A.

Replaces bad sectors

B.

Primarily for security

C.

Augments the RAM

D.

Reserved for system files

Questions # 29:

Where is the default location for 32-bit programs installed by a user on a 64-bit version of Windows 7?

Options:

A.

C:\ProgramData

B.

C:\Program files

C.

C:\Windows

D.

C:\Program files (x86)

Questions # 30:

Which forensics tool can be used to bypass the passcode of an Apple iPhone running the iOS operating system?

Options:

A.

iStumbler

B.

Ophcrack

C.

LOphtCrack

D.

XRY

Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions