WGU C702 FORENSICS AND
NETWORK INTRUSION EXAM
OBJECTIVE ASSESSMENT AND
PRE- ASSESSMENT 2025/2026
Save
Terms in this set (478)
An attack that Denial-of-service technique
sends a large
amount of data
to overwhelm
system
resources.
,A type of Mail bombing
denial-of-
service attack
that involves
sending a large
volume of
emails to a
target.
The step in Acquiring data
computer crime
forensics where
an investigator
duplicates and
images the
collected digital
information.
The last step of Testifying in court
a criminal
investigation
that requires the
involvement of
a computer
forensic
investigator.
,Checking to see Verifying an Android mobile
if it is plugged device
into a computer
without
potentially
changing the
original
evidence.
An alternative Aluminum foil
material a
forensic
investigator can
use to protect a
mobile device if
a Faraday bag is
not available.
, The criterion Availability to the general public
that determines
whether a
technology
used by
government to
obtain
information in a
computer
search is
considered
innovative and
requires a
search warrant.
A situation that Imminent danger
allows a law
enforcement
officer to seize
a hard drive
from a
residence
without
obtaining a
search warrant.
NETWORK INTRUSION EXAM
OBJECTIVE ASSESSMENT AND
PRE- ASSESSMENT 2025/2026
Save
Terms in this set (478)
An attack that Denial-of-service technique
sends a large
amount of data
to overwhelm
system
resources.
,A type of Mail bombing
denial-of-
service attack
that involves
sending a large
volume of
emails to a
target.
The step in Acquiring data
computer crime
forensics where
an investigator
duplicates and
images the
collected digital
information.
The last step of Testifying in court
a criminal
investigation
that requires the
involvement of
a computer
forensic
investigator.
,Checking to see Verifying an Android mobile
if it is plugged device
into a computer
without
potentially
changing the
original
evidence.
An alternative Aluminum foil
material a
forensic
investigator can
use to protect a
mobile device if
a Faraday bag is
not available.
, The criterion Availability to the general public
that determines
whether a
technology
used by
government to
obtain
information in a
computer
search is
considered
innovative and
requires a
search warrant.
A situation that Imminent danger
allows a law
enforcement
officer to seize
a hard drive
from a
residence
without
obtaining a
search warrant.