100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU C702 Forensics & Network Intrusion Exam 2025/2026 – Objective & PreAssessment Guide

Rating
-
Sold
-
Pages
44
Grade
A+
Uploaded on
12-01-2026
Written in
2025/2026

Ace your WGU C702 Forensics and Network Intrusion exam with our 2025/2026 objective and pre-assessment guide. Includes key concepts, practice questions, and exam strategies.

Institution
WGU C702\\\\\\\\\\\\WGU C702:
Course
WGU C702\\\\\\\\\\\\WGU C702:











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU C702\\\\\\\\\\\\WGU C702:
Course
WGU C702\\\\\\\\\\\\WGU C702:

Document information

Uploaded on
January 12, 2026
Number of pages
44
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

WGU C702 Forensics and Network
Intrusion Exam: Objective & Pre-
Assessment 2025/2026




An attack that sends a large amount of data to overwhelm system resources. ans ✔✨---Denial-of-
service technique



A type of denial-of-service attack that involves sending a large volume of emails to a target.
ans ✔✨---Mail bombing



The step in computer crime forensics where an investigator duplicates and images the collected digital
information. ans ✔✨---Acquiring data



The last step of a criminal investigation that requires the involvement of a computer forensic
investigator. ans ✔✨---Testifying in court



Checking to see if it is plugged into a computer without potentially changing the original evidence.
ans ✔✨---Verifying an Android mobile device



An alternative material a forensic investigator can use to protect a mobile device if a Faraday bag is not
available. ans ✔✨---Aluminum foil

,The criterion that determines whether a technology used by government to obtain information in a
computer search is considered innovative and requires a search warrant. ans ✔✨---Availability to
the general public



A situation that allows a law enforcement officer to seize a hard drive from a residence without
obtaining a search warrant. ans ✔✨---Imminent danger



A legal document that contains a summary of findings and is used to prosecute. ans ✔✨---
Investigation report



A protective bag used to prevent any signals from reaching a mobile phone. ans ✔✨---Faraday bag



An ethical behavior for a forensic investigator while testifying in court. ans ✔✨---Providing and
explaining facts



What a government agent should have complied with during a case involving malware on a system.
ans ✔✨---Search and seizure compliance



A part of the United States Constitution that protects citizens from unreasonable searches and seizures.
ans ✔✨---Fourth Amendment



A law that governs the voluntary and compelled disclosure of stored wire and electronic
communications and transactional records. ans ✔✨---Stored Communications Act



Legislation that aims to ensure all internet traffic is treated equally without discrimination or charging
differently. ans ✔✨---Net Neutrality Bill



Rules that govern the introduction of evidence at civil and criminal trials in United States federal trial
courts. ans ✔✨---Federal Rules of Evidence

,A method where the investigator only has access to the stego object and no plaintext. ans ✔✨---
Stego-only



A method where the investigator knows the stego object but not the plaintext. ans ✔✨---Known-
stego



A method where the investigator has access to the plaintext message and uses it to find the hidden
information. ans ✔✨---Known-message



A method where the investigator selects a plaintext message to analyze and find the algorithm used to
hide information. ans ✔✨---Chosen-message



An operating system developed by Apple Inc. for Macintosh computers. ans ✔✨---OS X



A password cracker used to recover passwords on an OS X operating system. ans ✔✨---DaveGrohl



A tool that allows a forensic investigator to process Transmission Control Protocol (TCP) streams for
analysis of malicious traffic. ans ✔✨---Wireshark



A type of cybercrime investigation approach where the company issues warnings to employees violating
policy. ans ✔✨---Administrative



A model that applies a holistic approach toward any criminal activity as a criminal operation.
ans ✔✨---Enterprise Theory of Investigation



A legal document obtained by a forensic investigator before seizing a computing device in a criminal
case. ans ✔✨---Court warrant



An activity used to check whether an application has ever been installed on a computer. ans ✔✨---
Log review

, An organization's preparedness to handle cybercrimes, which includes cost considerations.
ans ✔✨---Forensic readiness



A document that must be signed by those who obtain access to a piece of evidence. ans ✔✨---
Chain of custody document



A tool that allows an investigator to review or process information in a Windows environment without
relying on the Windows API. ans ✔✨---EnCase



A setup designed to connect to an organization's network switch with a random name and hidden SSID.
ans ✔✨---Unauthorized wireless access point



Create a backdoor that a perpetrator can use by connecting wirelessly to the network ans ✔✨---
Backdoor



Jam the wireless signals to stop all legitimate traffic from using the wireless network ans ✔✨---
Jamming



Activate the wireless cards in the laptops of victims to gain access to their data and network
ans ✔✨---Wireless Card Activation



Transmit high-power signals that force users to connect to the rogue wireless network ans ✔✨---
Rogue Wireless Network



Which web-based application attack corrupts the execution stack of a web application? ans ✔✨---
Buffer Overflow



Which file extension should the investigator search for to find the archived message on the server?
ans ✔✨---Archived Message File Extension



.EDB ans ✔✨---.EDB

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
TUTORWILLIAM NURSING
View profile
Follow You need to be logged in order to follow users or courses
Sold
138
Member since
2 year
Number of followers
55
Documents
3409
Last sold
1 week ago
TUTOR WILLIAM

4.8

75 reviews

5
67
4
4
3
1
2
1
1
2

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions