WGU C840 OA Digital Forensics 2022/2023
1. expert report>> A formal document prepared by a forensics specialist
to doc- ument an investigation, including a list of all tests conducted
as well as the specialist's own curriculum vitae (CV). Anything the
specialist plans to testify about at a trial must be included in the
expert report.
2. Testimonial evidence>> Information that forensic specialists use to
support or interpret real or documentary evidence; for example, to
demonstrate that the fingerprints found on a keyboard are those of a
specific individual.
3. Daubert standard>> The standard holding that only methods and
tools widely accepted in the scientific community can be used in
court.
4. If the computer is turned on when you arrive, what does the Secret
Service recommend you do>>> Shut down according to the
recommended Secret Service procedure.
5. Communications Assistance to Law Enforcement Act of 1994>> The
Com- munications Assistance to Law Enforcement Act of 1994 is a
federal wiretap law for traditional wired telephony. It was expanded to
include wireless, voice over packet, and other forms of electronic
,communications, including signaling traffic and metadata.
6. Digital evidence>> Digital evidence is information processed and
assembled so that it is relevant to an investigation and supports a
specific finding or determina- tion.
7. Federal Privacy Act of 1974>> The Federal Privacy Act of 1974, a
United States federal law that establishes a code of Fair Information
Practice that governs the collection, maintenance, use, and
dissemination of information about individuals that is maintained in
systems of records by U.S. federal agencies.
8. Power Spy, Verity, ICU, and WorkTime>> Spyware
9. good fictitious e-mail response rate>> 1-3%
10.Which crime is most likely to leave e-mail evidence>>> Cyberstalking
11.Where would you seek evidence that ophcrack had been used on a
Windows Server 2008 machine>>> In the logs of the server; look for
the reboot of the system
12.A SYN flood is an example of what>>> DoS attack
13.definition of a virus, in relation to a computer>>> a type of
malware that requires a host program or human help to propagate
14. What is the starting point for investigating the denial of service
attacks?-
>> Tracing the packets
,15.China Eagle Union>> The cyberterrorism group, the China Eagle
Union, con- sists of several thousand Chinese hackers whose stated
goal is to infiltrate Western computer systems. Members and leaders
of the group insist that not only does the Chinese government have no
involvement in their activities, but that they are breaking Chinese law
and are in constant danger of arrest and imprisonment. However,
most analysts believe this group is working with the full knowledge
and support of the Chinese government.
16.Rules of evidence>> Rules that govern whether, when, how, and
why proof of a legal case can be placed before a judge or jury.
17.file slack>> The unused space between the logical end of the
file and the physical end of the file. It is also called slack space.
18.The Analysis Plan>> Before forensic examination can begin, an
analysis plan should be created. This plan guides work in the analysis
process. How will you gather evidence? Are there concerns about
evidence being changed or destroyed? What tools are most
appropriate for this specific investigation? A standard data analysis
plan should be created and customized for specific situations and
circum- stances.
19.What is the most important reason that you not touch the actual
original evidence any more than you have to>>> Each time you touch
digital data, there is some chance of altering it.
20.You should make at least two bitstream copies of a suspect drive.>>
TRUE
, 21.To preserve digital evidence, an investigator should>> make two
copies of each evidence item using different imaging tools
22.What would be the primary reason for you to recommend for or against
making a DOS Copy>> A simple DOS copy will not include deleted files,
file slack, and other information.
23. Which starting-point forensic certification covers the general
principles and techniques of forensics, but not specific tools such as
EnCase or FTK?-
>> (CHFI) EC Council Certified Hacking Forensic Investigator
24.This forensic certification is open to both the public and private sectors
and is specific to the use and mastery of FTK. Requirements for taking the
exam include completing the boot camp and Windows forensic courses.>>
Ac- cessData Certified Examiner. AccessData is the creator of Forensic
Toolkit (FTK) software.
1. expert report>> A formal document prepared by a forensics specialist
to doc- ument an investigation, including a list of all tests conducted
as well as the specialist's own curriculum vitae (CV). Anything the
specialist plans to testify about at a trial must be included in the
expert report.
2. Testimonial evidence>> Information that forensic specialists use to
support or interpret real or documentary evidence; for example, to
demonstrate that the fingerprints found on a keyboard are those of a
specific individual.
3. Daubert standard>> The standard holding that only methods and
tools widely accepted in the scientific community can be used in
court.
4. If the computer is turned on when you arrive, what does the Secret
Service recommend you do>>> Shut down according to the
recommended Secret Service procedure.
5. Communications Assistance to Law Enforcement Act of 1994>> The
Com- munications Assistance to Law Enforcement Act of 1994 is a
federal wiretap law for traditional wired telephony. It was expanded to
include wireless, voice over packet, and other forms of electronic
,communications, including signaling traffic and metadata.
6. Digital evidence>> Digital evidence is information processed and
assembled so that it is relevant to an investigation and supports a
specific finding or determina- tion.
7. Federal Privacy Act of 1974>> The Federal Privacy Act of 1974, a
United States federal law that establishes a code of Fair Information
Practice that governs the collection, maintenance, use, and
dissemination of information about individuals that is maintained in
systems of records by U.S. federal agencies.
8. Power Spy, Verity, ICU, and WorkTime>> Spyware
9. good fictitious e-mail response rate>> 1-3%
10.Which crime is most likely to leave e-mail evidence>>> Cyberstalking
11.Where would you seek evidence that ophcrack had been used on a
Windows Server 2008 machine>>> In the logs of the server; look for
the reboot of the system
12.A SYN flood is an example of what>>> DoS attack
13.definition of a virus, in relation to a computer>>> a type of
malware that requires a host program or human help to propagate
14. What is the starting point for investigating the denial of service
attacks?-
>> Tracing the packets
,15.China Eagle Union>> The cyberterrorism group, the China Eagle
Union, con- sists of several thousand Chinese hackers whose stated
goal is to infiltrate Western computer systems. Members and leaders
of the group insist that not only does the Chinese government have no
involvement in their activities, but that they are breaking Chinese law
and are in constant danger of arrest and imprisonment. However,
most analysts believe this group is working with the full knowledge
and support of the Chinese government.
16.Rules of evidence>> Rules that govern whether, when, how, and
why proof of a legal case can be placed before a judge or jury.
17.file slack>> The unused space between the logical end of the
file and the physical end of the file. It is also called slack space.
18.The Analysis Plan>> Before forensic examination can begin, an
analysis plan should be created. This plan guides work in the analysis
process. How will you gather evidence? Are there concerns about
evidence being changed or destroyed? What tools are most
appropriate for this specific investigation? A standard data analysis
plan should be created and customized for specific situations and
circum- stances.
19.What is the most important reason that you not touch the actual
original evidence any more than you have to>>> Each time you touch
digital data, there is some chance of altering it.
20.You should make at least two bitstream copies of a suspect drive.>>
TRUE
, 21.To preserve digital evidence, an investigator should>> make two
copies of each evidence item using different imaging tools
22.What would be the primary reason for you to recommend for or against
making a DOS Copy>> A simple DOS copy will not include deleted files,
file slack, and other information.
23. Which starting-point forensic certification covers the general
principles and techniques of forensics, but not specific tools such as
EnCase or FTK?-
>> (CHFI) EC Council Certified Hacking Forensic Investigator
24.This forensic certification is open to both the public and private sectors
and is specific to the use and mastery of FTK. Requirements for taking the
exam include completing the boot camp and Windows forensic courses.>>
Ac- cessData Certified Examiner. AccessData is the creator of Forensic
Toolkit (FTK) software.