100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU D431 Digital Forensics in Cybersecurity OBJECTIVE ASSESSMENT ACTUAL EXAM 2025/2026 COMPLETE QUESTIONS WITH VERIFIED CORRECT ANSWERS || 100% GUARANTEED PASS <NEWEST VERSION>

Rating
-
Sold
-
Pages
61
Grade
A+
Uploaded on
21-03-2025
Written in
2024/2025

WGU D431 Digital Forensics in Cybersecurity OBJECTIVE ASSESSMENT ACTUAL EXAM 2025/2026 COMPLETE QUESTIONS WITH VERIFIED CORRECT ANSWERS || 100% GUARANTEED PASS &lt;NEWEST VERSION&gt; 1. Anti-forensics - ANSWER The actions that perpetrators take to conceal their locations, activities, or identities. 2. Cell-phone forensics - ANSWER The process of searching the contents of cell phones. 3. Chain of custody - ANSWER The continuity of control of evidence that makes it possible to account for all that has happened to evidence between its original collection and its appearance in court, preferably unaltered 4. Computer forensics - ANSWER The use of analytical and investigative techniques to identify, collect, examine and preserve computer-based material for presentation as evidence in a court of law 5. Curriculum Vitae (CV) - ANSWER An extensive document expounding one's experience and qualifications for a position, similar to a resume but with more detail. In academia and expert work, a CV is usually used rather than a resume 6. Daubert Standard - ANSWER The standard holding that only methods and tools widely accepted in the scientific community can be used in court. 7. Demonstrative Evidence - ANSWER Information that helps explain other evidence. And example is a chart that explains a technical concept to the judge and jury 8. Digital Evidence - ANSWER Information that has been processed and assembled so that it is relevant to an investigation and supports a specific finding or determination 9. Disk Forensics - ANSWER The process of acquiring and analyzing information stored on physical storage media, such as computer hard drives or smartphones 10. Documentary Evidence - ANSWER Data stored in written form, on paper or in electronic files, such as email messages and telephone call-detail records. Investigators must authenticate documentary evidence. 11. Email Forensics - ANSWER The study of the source and content of email as evidence, including the identification of the sender, recipient, date, time, and origination location of an email message. 12. ECPA (Electronic Communications Privacy Act) - ANSWER prohibits interception and disclosure of wire, oral, or electronic communications without employee consent 13. 18 U.S.C. 2252B - ANSWER Misleading domains on Internet to bait the underage 14. CALEA (Communications Assistance for Law Enforcement Act) - ANSWER requires the telecommunications industry to build tools into its products that federal investigators can use—after gaining a court order—to eavesdrop on conversations and intercept electronic communications. 15. FISA (Foreign Intelligence Surveillance Act) - ANSWER A special court that approves electronic eavesdropping on foreign spies 16. CSA - ANSWER must have at least minimal security practices in place 17. USA Patriot Act - ANSWER Act that gives federal officials greater authority to take measures to combat terrorism. 18. Child protect and sex predator act - ANSWER Service provider must report cp 19. Communication Decency Act - ANSWER Act to regulate obscenity available through the Internet and online communications. 20. Telecommunications Act of 1996 - ANSWER federal legislation that deregulated the communications media 21. The Wireless Communications and Public Safety Act of 1999 - ANSWER Allows for collection and use of "empty" communications, which means nonverbal and nontext communications, such as GPS information. 22. SOX (Sarbanes-Oxley Act) - ANSWER Requires companies to review internal control and take responsibility for the accuracy and completeness of their financial reports. 23. 18 USC 1030 - ANSWER Fraud and related activity in connection with computers 24. 18 usc 1020 - ANSWER Addresses fraud related to access devices. (Router) 25. DCMA (Digital Millennium Copyright Act) - ANSWER Prohibition of attempts to circument copyright protection mechanisms placed on protected works. Protects digital media. Penalties of $1,000,000 and 10 years imprisonment. Non-profits and schools are exempt. Limits liability of ISP's under certain circumstances 26. 18 USC 1028(a) - ANSWER identity theft 27. 18 usc 2251 - ANSWER Sexual exploitation of children 28. 18 USC 2260 - ANSWER Production of sexually explicit depictions of a minor for importation into the US 29. 18 usc 2252 - ANSWER Makes it illegal to distribute child pornography 30. 18 usc 2252a - ANSWER Certain activities relating to material constituting or containing child pornography 31. NIST 800-34 - ANSWER The Business Continuity plan guidelines are defined 32. Federal Privacy Act of 1974 - ANSWER Regulates what personal information the Federal government can collect about private individuals 33. Which storage tech uses NAND? - ANSWER SSD 34. What uses AFF file format? - ANSWER Autopsy and Sleuth Kit 35. What law applies to collection of GPS location data? - ANSWER The Wireless Communications and Public Safety Act of 1999 36. What law applies to intercepting communications with the computer owner's permission? - ANSWER 18 U.S.C. 2511 is the embodiment of the Electronic Communications Privacy Act (ECPA) of 1986 into criminal law. It is a crime to intentionally intercept, disclose, or use any wire, oral, or electronic communication in violation of federal law.This law applies to any person who is not a party to the communication and who intentionally intercepts, discloses, or uses that communication without the consent of at least one party. 37. Where do deleted Apple iphone/ipad files go? - ANSWER /.Trashes/501 38. Which types of data are the authorities allowed to get from service providers? - ANSWER The ECPA requires different legal processes to obtain specific types of information: *Basic subscriber information*: includes name, address, billing information including a credit card number, telephone toll billing records, subscriber's telephone number, type of service, and length of service. An investigator can obtain this type of information with a subpoena, court order, or search warrant.

Show more Read less
Institution
WGU D431 Digital Forensics In Cybersecurity
Course
WGU D431 Digital Forensics in Cybersecurity











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU D431 Digital Forensics in Cybersecurity
Course
WGU D431 Digital Forensics in Cybersecurity

Document information

Uploaded on
March 21, 2025
Number of pages
61
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU D431 Digital Forensics in
Cybersecurity OBJECTIVE
ASSESSMENT ACTUAL EXAM 2025/2026
COMPLETE QUESTIONS WITH VERIFIED
CORRECT ANSWERS || 100%
GUARANTEED PASS
<NEWEST VERSION>


1. Anti-forensics - ANSWER ✓ The actions that perpetrators take to conceal
their locations, activities, or identities.

2. Cell-phone forensics - ANSWER ✓ The process of searching the contents of
cell phones.

3. Chain of custody - ANSWER ✓ The continuity of control of evidence that
makes it possible to account for all that has happened to evidence between
its original collection and its appearance in court, preferably unaltered

4. Computer forensics - ANSWER ✓ The use of analytical and investigative
techniques to identify, collect, examine and preserve computer-based
material for presentation as evidence in a court of law

5. Curriculum Vitae (CV) - ANSWER ✓ An extensive document expounding
one's experience and qualifications for a position, similar to a resume but
with more detail. In academia and expert work, a CV is usually used rather
than a resume

6. Daubert Standard - ANSWER ✓ The standard holding that only methods
and tools widely accepted in the scientific community can be used in court.

,7. Demonstrative Evidence - ANSWER ✓ Information that helps explain other
evidence. And example is a chart that explains a technical concept to the
judge and jury

8. Digital Evidence - ANSWER ✓ Information that has been processed and
assembled so that it is relevant to an investigation and supports a specific
finding or determination

9. Disk Forensics - ANSWER ✓ The process of acquiring and analyzing
information stored on physical storage media, such as computer hard drives
or smartphones

10.Documentary Evidence - ANSWER ✓ Data stored in written form, on paper
or in electronic files, such as email messages and telephone call-detail
records. Investigators must authenticate documentary evidence.

11.Email Forensics - ANSWER ✓ The study of the source and content of email
as evidence, including the identification of the sender, recipient, date, time,
and origination location of an email message.

12.ECPA (Electronic Communications Privacy Act) - ANSWER ✓ prohibits
interception and disclosure of wire, oral, or electronic communications
without employee consent

13.18 U.S.C. 2252B - ANSWER ✓ Misleading domains on Internet to bait the
underage

14.CALEA (Communications Assistance for Law Enforcement Act) -
ANSWER ✓ requires the telecommunications industry to build tools into its
products that federal investigators can use—after gaining a court order—to
eavesdrop on conversations and intercept electronic communications.

15.FISA (Foreign Intelligence Surveillance Act) - ANSWER ✓ A special court
that approves electronic eavesdropping on foreign spies

16.CSA - ANSWER ✓ must have at least minimal security practices in place

,17.USA Patriot Act - ANSWER ✓ Act that gives federal officials greater
authority to take measures to combat terrorism.

18.Child protect and sex predator act - ANSWER ✓ Service provider must
report cp

19.Communication Decency Act - ANSWER ✓ Act to regulate obscenity
available through the Internet and online communications.

20.Telecommunications Act of 1996 - ANSWER ✓ federal legislation that
deregulated the communications media

21.The Wireless Communications and Public Safety Act of 1999 - ANSWER ✓
Allows for collection and use of "empty" communications, which means
nonverbal and nontext communications, such as GPS information.

22.SOX (Sarbanes-Oxley Act) - ANSWER ✓ Requires companies to review
internal control and take responsibility for the accuracy and completeness of
their financial reports.

23.18 USC 1030 - ANSWER ✓ Fraud and related activity in connection with
computers

24.18 usc 1020 - ANSWER ✓ Addresses fraud related to access devices.
(Router)

25.DCMA (Digital Millennium Copyright Act) - ANSWER ✓ Prohibition of
attempts to circument copyright protection mechanisms placed on protected
works. Protects digital media. Penalties of $1,000,000 and 10 years
imprisonment. Non-profits and schools are exempt. Limits liability of ISP's
under certain circumstances

26.18 USC 1028(a) - ANSWER ✓ identity theft

27.18 usc 2251 - ANSWER ✓ Sexual exploitation of children

28.18 USC 2260 - ANSWER ✓ Production of sexually explicit depictions of a
minor for importation into the US

, 29.18 usc 2252 - ANSWER ✓ Makes it illegal to distribute child pornography

30.18 usc 2252a - ANSWER ✓ Certain activities relating to material
constituting or containing child pornography

31.NIST 800-34 - ANSWER ✓ The Business Continuity plan guidelines are
defined

32.Federal Privacy Act of 1974 - ANSWER ✓ Regulates what personal
information the Federal government can collect about private individuals

33.Which storage tech uses NAND? - ANSWER ✓ SSD

34.What uses AFF file format? - ANSWER ✓ Autopsy and Sleuth Kit

35.What law applies to collection of GPS location data? - ANSWER ✓ The
Wireless Communications and Public Safety Act of 1999

36.What law applies to intercepting communications with the computer owner's
permission? - ANSWER ✓ 18 U.S.C. 2511 is the embodiment of the
Electronic Communications Privacy Act (ECPA) of 1986 into criminal law.
It is a crime to intentionally intercept, disclose, or use any wire, oral, or
electronic communication in violation of federal law.This law applies to any
person who is not a party to the communication and who intentionally
intercepts, discloses, or uses that communication without the consent of at
least one party.

37.Where do deleted Apple iphone/ipad files go? - ANSWER ✓ /.Trashes/501

38.Which types of data are the authorities allowed to get from service
providers? - ANSWER ✓ The ECPA requires different legal processes to
obtain specific types of information:
*Basic subscriber information*: includes name, address, billing information
including a credit card number, telephone toll billing records, subscriber's
telephone number, type of service, and length of service. An investigator can
obtain this type of information with a subpoena, court order, or search
warrant.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
ProfBenjamin Havard School
View profile
Follow You need to be logged in order to follow users or courses
Sold
469
Member since
1 year
Number of followers
14
Documents
3238
Last sold
9 hours ago
EXCELLENT ACHIEVERS LIBRARY

As a professional tutor, I provide exceptional assistance with homework, quizzes, and exams across various subjects, including Psychology, Nursing, Biological Sciences, Business, Engineering, Human Resource Management, and Mathematics. I am dedicated to offering high-quality support and ensuring that all work meets scholarly standards. To enhance the effectiveness of our services, I work with a team of experienced tutors to create comprehensive and effective revision materials. Together, we are committed to helping students achieve excellent grades through our collaborative efforts and expertise.

Read more Read less
3.8

91 reviews

5
41
4
13
3
25
2
5
1
7

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions