100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Other

WGU C840 OA Digital Forensics Questions and Answers 2025/2026 (100% Verified Answers by Expert)

Rating
-
Sold
2
Pages
31
Uploaded on
03-11-2022
Written in
2022/2023

WGU C840 OA Digital Forensics Questions and Answers 2022/2023 (100% Verified Answers by Expert) WGU C840 OA Digital Forensics Questions and Answers 2022/2023 (100% Verified Answers by Expert)












Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
November 3, 2022
Number of pages
31
Written in
2022/2023
Type
Other
Person
Unknown

Subjects

  • wgu c840 oa

Content preview

WGU C840 OA Digital Forensics 2022/2023


1. expert report>> A formal document prepared by a forensics specialist
to doc- ument an investigation, including a list of all tests conducted
as well as the specialist's own curriculum vitae (CV). Anything the
specialist plans to testify about at a trial must be included in the
expert report.

2. Testimonial evidence>> Information that forensic specialists use to
support or interpret real or documentary evidence; for example, to
demonstrate that the fingerprints found on a keyboard are those of a
specific individual.

3. Daubert standard>> The standard holding that only methods and
tools widely accepted in the scientific community can be used in
court.

4. If the computer is turned on when you arrive, what does the Secret
Service recommend you do>>> Shut down according to the
recommended Secret Service procedure.

5. Communications Assistance to Law Enforcement Act of 1994>> The
Com- munications Assistance to Law Enforcement Act of 1994 is a
federal wiretap law for traditional wired telephony. It was expanded to
include wireless, voice over packet, and other forms of electronic

,communications, including signaling traffic and metadata.

6. Digital evidence>> Digital evidence is information processed and
assembled so that it is relevant to an investigation and supports a
specific finding or determina- tion.

7. Federal Privacy Act of 1974>> The Federal Privacy Act of 1974, a
United States federal law that establishes a code of Fair Information
Practice that governs the collection, maintenance, use, and
dissemination of information about individuals that is maintained in
systems of records by U.S. federal agencies.

8. Power Spy, Verity, ICU, and WorkTime>> Spyware

9. good fictitious e-mail response rate>> 1-3%

10.Which crime is most likely to leave e-mail evidence>>> Cyberstalking

11.Where would you seek evidence that ophcrack had been used on a
Windows Server 2008 machine>>> In the logs of the server; look for
the reboot of the system

12.A SYN flood is an example of what>>> DoS attack

13.definition of a virus, in relation to a computer>>> a type of
malware that requires a host program or human help to propagate

14. What is the starting point for investigating the denial of service
attacks?-
>> Tracing the packets

,15.China Eagle Union>> The cyberterrorism group, the China Eagle
Union, con- sists of several thousand Chinese hackers whose stated
goal is to infiltrate Western computer systems. Members and leaders
of the group insist that not only does the Chinese government have no
involvement in their activities, but that they are breaking Chinese law
and are in constant danger of arrest and imprisonment. However,
most analysts believe this group is working with the full knowledge
and support of the Chinese government.

16.Rules of evidence>> Rules that govern whether, when, how, and
why proof of a legal case can be placed before a judge or jury.

17.file slack>> The unused space between the logical end of the
file and the physical end of the file. It is also called slack space.

18.The Analysis Plan>> Before forensic examination can begin, an
analysis plan should be created. This plan guides work in the analysis
process. How will you gather evidence? Are there concerns about
evidence being changed or destroyed? What tools are most
appropriate for this specific investigation? A standard data analysis
plan should be created and customized for specific situations and
circum- stances.

19.What is the most important reason that you not touch the actual
original evidence any more than you have to>>> Each time you touch
digital data, there is some chance of altering it.

20.You should make at least two bitstream copies of a suspect drive.>>
TRUE

, 21.To preserve digital evidence, an investigator should>> make two
copies of each evidence item using different imaging tools

22.What would be the primary reason for you to recommend for or against
making a DOS Copy>> A simple DOS copy will not include deleted files,
file slack, and other information.

23. Which starting-point forensic certification covers the general
principles and techniques of forensics, but not specific tools such as
EnCase or FTK?-
>> (CHFI) EC Council Certified Hacking Forensic Investigator

24.This forensic certification is open to both the public and private sectors
and is specific to the use and mastery of FTK. Requirements for taking the
exam include completing the boot camp and Windows forensic courses.>>
Ac- cessData Certified Examiner. AccessData is the creator of Forensic
Toolkit (FTK) software.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
LectJohn Liberty University
View profile
Follow You need to be logged in order to follow users or courses
Sold
2713
Member since
3 year
Number of followers
1310
Documents
4481
Last sold
16 hours ago

3.9

506 reviews

5
260
4
81
3
79
2
26
1
60

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions