100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU C702 Digital Forensics and Network Intrusion Exam Prep | Complete Study Guide with Key Concepts and Tools | Questions and Answers

Rating
-
Sold
-
Pages
36
Grade
A+
Uploaded on
01-11-2025
Written in
2025/2026

This WGU C702 Forensics and Network Intrusion Study Guide provides a detailed and structured review of all major topics covered in the Western Governors University C702 certification exam. It includes essential material on digital forensics processes, evidence collection, data acquisition methods, RAID recovery, steganography, and network intrusion detection. The guide also explains critical concepts such as chain of custody, volatile vs. nonvolatile data, email and mobile forensics, incident response, and the Federal Rules of Evidence. Additionally, it covers practical forensic tools like FTK, EnCase, ProDiscover, Autopsy, and dd, helping students prepare for both theoretical and hands-on components of the exam.

Show more Read less
Institution
C702
Course
C702











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
C702
Course
C702

Document information

Uploaded on
November 1, 2025
Number of pages
36
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • ftk

Content preview

WGU C702 Forensics
and Network Intrusion
Exam Prep

,Denial-of-service technique kr




An attack that sends a large amount of data to overwhelm system resources.
kr kr kr kr kr kr kr kr kr kr kr kr




Mail bombing A type of denial-of-
kr kr kr kr




service attack that involves sending a large volume of emails to a target.
kr kr kr kr kr kr kr kr kr kr kr kr




Acquiring data kr




The step in computer crime forensics that requires an investigator to duplicate and image th
kr kr kr kr kr kr kr kr kr kr kr kr kr kr




e collected digital information.
kr kr kr




Testifying in court kr kr




The last step of a criminal investigation that requires the involvement of a computer forensi
kr kr kr kr kr kr kr kr kr kr kr kr kr kr




c investigator.
kr




Verifying an Android mobile device kr kr kr kr




Checking to see if it is plugged into a computer without potentially changing the original evi kr kr kr kr kr kr kr kr kr kr kr kr kr kr kr




dence.

Aluminum foil An alternative to a Faraday bag for protecting a mobile device.
kr kr kr kr kr kr kr kr kr kr kr




Search warrant innovation criterion
kr kr kr




Availability to the general public determines whether a technology requires a search warra kr kr kr kr kr kr kr kr kr kr kr kr




nt.

Seizing a hard drive without a warrant
kr kr kr kr kr kr




A law enforcement officer can seize a hard drive if the evidence is in imminent danger.
kr kr kr kr kr kr kr kr kr kr kr kr kr kr kr




Investigation report kr




A legal document that contains a summary of findings and is used to prosecute.
kr kr kr kr kr kr kr kr kr kr kr kr kr




Faraday bag kr A protective bag used to prevent signals from reaching a mobile phone.
kr kr kr kr kr kr kr kr kr kr kr




Ethical behavior while testifying
kr kr kr




Providing and explaining facts found during the investigation. kr kr kr kr kr kr kr




Search and seizure compliance
kr kr kr




What a government agent should have complied with during search and seizure in a case in
kr kr kr kr kr kr kr kr kr kr kr kr kr kr kr




volving malware. kr




Flashing lights kr




A method for a forensic investigator to verify an Android mobile device is on without interac
kr kr kr kr kr kr kr kr kr kr kr kr kr kr kr




ting with the operating system.
kr kr kr kr




Sturdy container kr An alternative to a Faraday bag for protecting a mobile device.
kr kr kr kr kr kr kr kr kr kr

,Cardboard box An alternative to a Faraday bag for protecting a mobile device.
kr kr kr kr kr kr kr kr kr kr kr




Bubble wrap An alternative to a Faraday bag for protecting a mobile device.
kr kr kr kr kr kr kr kr kr kr kr




Dependency on third-party software kr kr kr




A criterion that may determine whether a technology used by government requires a searc
kr kr kr kr kr kr kr kr kr kr kr kr kr




h warrant.
kr




Implementation based on open source software kr kr kr kr kr




A criterion that may determine whether a technology used by government requires a searc
kr kr kr kr kr kr kr kr kr kr kr kr kr




h warrant.
kr




Use of cloud-based machine learning
kr kr kr kr




A criterion that may determine whether a technology used by government requires a searc
kr kr kr kr kr kr kr kr kr kr kr kr kr




h warrant.
kr




Suspicious occupant behavior kr kr




Not a valid reason for a law enforcement officer to seize a hard drive without a warrant.
kr kr kr kr kr kr kr kr kr kr kr kr kr kr kr kr




Unattended computer kr




Not a valid reason for a law enforcement officer to seize a hard drive without a warrant.
kr kr kr kr kr kr kr kr kr kr kr kr kr kr kr kr




Wide open front door
kr kr kr




Not a valid reason for a law enforcement officer to seize a hard drive without a warrant.
kr kr kr kr kr kr kr kr kr kr kr kr kr kr kr kr




Fourth Amendment kr




A part of the United States Constitution that protects citizens from unreasonable searches a
kr kr kr kr kr kr kr kr kr kr kr kr kr




nd seizures.
kr




Stored Communications Act kr kr




A law that governs the voluntary and involuntary disclosure of stored wire and electronic co
kr kr kr kr kr kr kr kr kr kr kr kr kr kr




mmunications and transactional records. kr kr kr




Net Neutrality Bill
kr kr




Legislation that aims to ensure that internet service providers treat all data on the internet t kr kr kr kr kr kr kr kr kr kr kr kr kr kr kr




he same, without discriminating or charging differently.
kr kr kr kr kr kr




Federal Rules of Evidence kr kr kr




A set of rules that governs the introduction of evidence at civil and criminal trials in federal c
kr kr kr kr kr kr kr kr kr kr kr kr kr kr kr kr kr




ourts.

Stego-only
A method used in steganography where only the stego object is available to the investigator.
kr kr kr kr kr kr kr kr kr kr kr kr kr kr

, Known-stego
A method where the investigator has access to both the stego object and the method used t
kr kr kr kr kr kr kr kr kr kr kr kr kr kr kr kr




o hide the information.
kr kr kr




Known-message
A method where the investigator has access to the plaintext message and uses it to find the
kr kr kr kr kr kr kr kr kr kr kr kr kr kr kr kr kr




hidden information. kr




Chosen-message
A method where the investigator can choose a plaintext message and analyze it to find the h
kr kr kr kr kr kr kr kr kr kr kr kr kr kr kr kr




idden information.
kr




Linux An open-source operating system based on the Linux kernel.
kr kr kr kr kr kr kr kr




OS X kr An operating system developed by Apple Inc. for Macintosh computers.
kr kr kr kr kr kr kr kr kr




UNIX A powerful, multiuser operating system originally developed in the 1960s and 1970s.
kr kr kr kr kr kr kr kr kr kr kr




Windows A series of operating systems developed by Microsoft for personal computers.
kr kr kr kr kr kr kr kr kr kr




Cain and Abel
kr kr




A password recovery tool for Microsoft Windows that can recover passwords by sniffing the
kr kr kr kr kr kr kr kr kr kr kr kr kr kr




network, cracking encrypted passwords, and more.
kr kr kr kr kr




DaveGrohl
A password cracker specifically designed to recover passwords on OS X operating systems.
kr kr kr kr kr kr kr kr kr kr kr kr




L0phtCrack A password auditing and recovery application for Windows.
kr kr kr kr kr kr kr




Ophcrack An open-source Windows password cracker based on rainbow tables.
kr kr kr kr kr kr kr kr




Wireshark
A network protocol analyzer that allows for the capture and analysis of network traffic.
kr kr kr kr kr kr kr kr kr kr kr kr kr




Administrative
A type of cybercrime investigation approach focused on enforcing company policies and reg
kr kr kr kr kr kr kr kr kr kr kr kr




ulations.

Enterprise Theory of Investigation kr kr kr




A model that applies a holistic approach toward any criminal activity as a criminal operation
kr kr kr kr kr kr kr kr kr kr kr kr kr kr




.

Court warrant kr




A legal document issued by a judge authorizing law enforcement to conduct a search or seiz
kr kr kr kr kr kr kr kr kr kr kr kr kr kr kr




ure.
$17.48
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
Scholarmind

Get to know the seller

Seller avatar
Scholarmind Harvard University
View profile
Follow You need to be logged in order to follow users or courses
Sold
New on Stuvia
Member since
1 month
Number of followers
1
Documents
54
Last sold
-
BrightMind

Get verified question banks, updated exams, and real prep materials. Everything is 100% accurate, reliable, and ready for instant download. Can’t find a file? Message us — we’ll get it for you fast! Buy with confidence & leave a review after purchase!

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions