New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

WGU Digital-Forensics-in-Cybersecurity Digital Forensics in Cybersecurity (D431/C840DQO1) Course Exam Exam Practice Test

Digital Forensics in Cybersecurity (D431/C840DQO1) Course Exam Questions and Answers

Question 1

The chief executive officer (CEO) of a small computer company has identified a potential hacking attack from an outside competitor.

Which type of evidence should a forensics investigator use to identify the source of the hack?

Options:

A.

Network transaction logs

B.

Email archives

C.

File system metadata

D.

Browser history

Question 2

How should a forensic scientist obtain the network configuration from a Windows PC before seizing it from a crime scene?

Options:

A.

By checking the system properties

B.

By using the ipconfig command from a command prompt on the computer

C.

By opening the Network and Sharing Center

D.

By rebooting the computer into safe mode

Question 3

A computer involved in a crime is infected with malware. The computer is on and connected to the company's network. The forensic investigator arrives at the scene.

Which action should be the investigator's first step?

Options:

A.

Turn off the computer

B.

Unplug the computer's Ethernet cable

C.

Run malware removal tools

D.

Copy files to external media

Question 4

Which method is used to implement steganography through pictures?

Options:

A.

Metadata alteration

B.

Least Significant Bit (LSB) insertion

C.

Encrypting image pixels

D.

File compression

Question 5

An employee sends an email message to a fellow employee. The message is sent through the company's messaging server.

Which protocol is used to send the email message?

Options:

A.

SNMP

B.

IMAP

C.

POP3

D.

SMTP

Question 6

Which description applies to the Advanced Forensic Format (AFF)?

Options:

A.

An open file standard developed by AccessData

B.

A proprietary format used by the iLook tool

C.

An open file standard used by Sleuth Kit and Autopsy

D.

A proprietary format developed by Guidance Software

Question 7

Which operating system (OS) uses the NTFS (New Technology File System) file operating system?

Options:

A.

Linux

B.

Mac OS X v10.5

C.

Mac OS X v10.4

D.

Windows 8

Question 8

What are the three basic tasks that a systems forensic specialist must keep in mind when handling evidence during a cybercrime investigation?

Options:

A.

Find evidence, preserve evidence, and prepare evidence

B.

Find evidence, analyze evidence, and prosecute evidence

C.

Preserve evidence, encrypt evidence, and delete evidence

D.

Analyze evidence, prepare evidence, and document evidence

Question 9

An organization has identified a system breach and has collected volatile data from the system.

Which evidence type should be collected next?

Options:

A.

Running processes

B.

Network connections

C.

Temporary data

D.

File timestamps

Question 10

An employee is suspected of using a company Apple iPhone 4 for inappropriate activities.

Which utility should the company use to access the iPhone without knowing the passcode?

Options:

A.

Data Doctor

B.

Forensic Toolkit (FTK)

C.

Device Seizure

D.

Autopsy

Question 11

An organization believes that a company-owned mobile phone has been compromised.

Which software should be used to collect an image of the phone as digital evidence?

Options:

A.

PTFinder

B.

Forensic SIM Cloner

C.

Forensic Toolkit (FTK)

D.

Data Doctor

Question 12

Which technique allows a cybercriminal to hide information?

Options:

A.

Steganalysis

B.

Steganography

C.

Encryption

D.

Cryptography

Question 13

Thomas received an email stating he needed to follow a link and verify his bank account information to ensure it was secure. Shortly after following the instructions, Thomas noticed money was missing from his account.

Which digital evidence should be considered to determine how Thomas' account information was compromised?

Options:

A.

Email messages

B.

Browser cache

C.

Bank transaction logs

D.

Firewall logs

Question 14

How is the Windows swap file, also known as page file, used?

Options:

A.

Replaces bad sectors

B.

Primarily for security

C.

Augments the RAM

D.

Reserved for system files

Question 15

A company has identified that a hacker has modified files on one of the company's computers. The IT department has collected the storage media from the hacked computer.

Which evidence should be obtained from the storage media to identify which files were modified?

Options:

A.

File timestamps

B.

Private IP addresses

C.

Public IP addresses

D.

Operating system version

Question 16

Which directory contains the system's configuration files on a computer running Mac OS X?

Options:

A.

/var

B.

/bin

C.

/etc

D.

/cfg

Question 17

Which tool should be used with sound files, video files, and image files?

Options:

A.

Snow

B.

MP3Stego

C.

StegVideo

D.

Stealth Files 4

Question 18

Which storage format is a magnetic drive?

Options:

A.

CD-ROM

B.

SATA

C.

Blu-ray

D.

SSD

Question 19

Which law or guideline lists the four states a mobile device can be in when data is extracted from it?

Options:

A.

Health Insurance Portability and Accountability Act (HIPAA)

B.

NIST SP 800-72 Guidelines

C.

Electronic Communications Privacy Act (ECPA)

D.

Communications Assistance to Law Enforcement Act (CALEA)

Question 20

A forensic investigator needs to identify where email messages are stored on a Microsoft Exchange server.

Which file extension is used by Exchange email servers to store the mailbox database?

Options:

A.

.edb

B.

.nsf

C.

.mail

D.

.db

Question 21

Which file system is supported by Mac?

Options:

A.

NTFS

B.

EXT4

C.

Hierarchical File System Plus (HFS+)

D.

FAT32

Question 22

A forensic scientist is examining a computer for possible evidence of a cybercrime.

Why should the forensic scientist copy files at the bit level instead of the OS level when copying files from the computer to a forensic computer?

Options:

A.

Copying files at the OS level fails to copy deleted files or slack space.

B.

Copying files at the OS level takes too long to be practical.

C.

Copying files at the OS level changes the timestamp of the files.

D.

Copying files at the OS level will copy extra information that is unnecessary.

Question 23

A police detective investigating a threat traces the source to a house. The couple at the house shows the detective the only computer the family owns, which is in their son's bedroom. The couple states that their son is presently in class at a local middle school.

How should the detective legally gain access to the computer?

Options:

A.

Obtain consent to search from the parents

B.

Wait for the son to return and ask for consent

C.

Search immediately without consent due to emergency

D.

Get a warrant without consent