100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU C702 EXAM QUESTION AND ANSWERS WGU Forensics and Network Intrusion - C702 GRADED A+

Rating
-
Sold
-
Pages
19
Grade
A+
Uploaded on
28-02-2024
Written in
2023/2024

WGU C702 EXAM QUESTION AND ANSWERS WGU Forensics and Network Intrusion - C702 GRADED A+ Computer Forensics - CORRECT ANSWER-A set of methodological procedures and techniques that help identify, gather, preserve, extract, interpret, document, and present evidence from computers in a way that is legally admissible Cyber Crime - CORRECT ANSWER-Any illegal act involving a computing device, network, its systems, or its applications. Both internal and external Enterprise Theory of Investigation (ETI) - CORRECT ANSWERMethodology for investigating criminal activity Types of Cyber Crime - CORRECT ANSWER-Civil, Criminal, Administrative Civil Cases - CORRECT ANSWER-Involve disputes between two parties. Brought for violation of contracts and lawsuits where a guilty outcome generally results in monetary damages to the plaintiff Criminal Cases - CORRECT ANSWER-Brought by law enforcement agencies in response to a suspected violation of law where a guilty outcome results in monetary damages, imprisonment, or both Administrative Cases - CORRECT ANSWER-An internal investigation by an organization to discover if its employees/clients/partners are abiding by the rules or policies (Violation of company policies). Noncriminal in nature and are related to misconduct or activities of an employee Rules of Forensic Investigation - CORRECT ANSWER-Safeguard the integrity of the evidence and render it acceptable in a court of law. The forensic examiner must make duplicate copies of the original evidence. The duplicate copies must be accurate replications of the originals, and the forensic examiner must also authenticate the duplicate copies to avoid questions about the integrity of the evidence. Must not continue with the investigation if the examination is going to be beyond his or her knowledge level or skill level. Cyber Crime Investigation Methodology/Steps - CORRECT ANSWER1.Identify the computer crime 2.Collect preliminary evidence 3.Obtain court warrant dor discovery/seizure of evidence 4.Perform first responder procedures 5.Seize evidence at the crime scene 6. Transport evidence to lab 7.Create two bitstream copies of the evidence 8. Generate MD5 checksum of the images 9. Maintain chain of custody 10. Store original evidence in secure location 11. Analyze the image copy for evidence 12. Prepare a forensic report 13. Submit a report to client 14. Testify in course as an expert witness Locard's Exchange Principle - CORRECT ANSWER-Anyone of anything, entering a crime scene takes something of the scene with them and leaves something of themselves behind when they leave.

Show more Read less
Institution
Course

Content preview

WGU C702 EXAM QUESTION AND
ANSWERS WGU Forensics and
Network Intrusion - C702 GRADED A+

,Computer Forensics - CORRECT ANSWER-A set of methodological
procedures and techniques that help identify, gather, preserve,
extract, interpret, document, and present evidence from computers
in a way that is legally admissible


Cyber Crime - CORRECT ANSWER-Any illegal act involving a
computing device, network, its systems, or its applications. Both
internal and external


Enterprise Theory of Investigation (ETI) - CORRECT ANSWER-
Methodology for investigating criminal activity


Types of Cyber Crime - CORRECT ANSWER-Civil, Criminal,
Administrative


Civil Cases - CORRECT ANSWER-Involve disputes between two
parties. Brought for violation of contracts and lawsuits where a
guilty outcome generally results in monetary damages to the
plaintiff


Criminal Cases - CORRECT ANSWER-Brought by law enforcement
agencies in response to a suspected violation of law where a guilty
outcome results in monetary damages, imprisonment, or both


Administrative Cases - CORRECT ANSWER-An internal investigation
by an organization to discover if its employees/clients/partners are

, abiding by the rules or policies (Violation of company policies). Non-
criminal in nature and are related to misconduct or activities of an
employee


Rules of Forensic Investigation - CORRECT ANSWER-Safeguard the
integrity of the evidence and render it acceptable in a court of law.
The forensic examiner must make duplicate copies of the original
evidence. The duplicate copies must be accurate replications of the
originals, and the forensic examiner must also authenticate the
duplicate copies to avoid questions about the integrity of the
evidence. Must not continue with the investigation if the
examination is going to be beyond his or her knowledge level or skill
level.


Cyber Crime Investigation Methodology/Steps - CORRECT ANSWER-
1.Identify the computer crime 2.Collect preliminary evidence
3.Obtain court warrant dor discovery/seizure of evidence 4.Perform
first responder procedures 5.Seize evidence at the crime scene 6.
Transport evidence to lab 7.Create two bitstream copies of the
evidence 8. Generate MD5 checksum of the images 9. Maintain
chain of custody 10. Store original evidence in secure location 11.
Analyze the image copy for evidence 12. Prepare a forensic report
13. Submit a report to client 14. Testify in course as an expert
witness


Locard's Exchange Principle - CORRECT ANSWER-Anyone of
anything, entering a crime scene takes something of the scene with
them and leaves something of themselves behind when they leave.

Written for

Institution
Study
Course

Document information

Uploaded on
February 28, 2024
Number of pages
19
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$23.18
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
fridahmunene626

Get to know the seller

Seller avatar
fridahmunene626 Walsall College
Follow You need to be logged in order to follow users or courses
Sold
3
Member since
1 year
Number of followers
1
Documents
213
Last sold
8 months ago

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions