CORRECT ANSWERS/ WGU C702 EXAM / EXAM QUESTIONS
AND ANSWERS / VERIFIED ANSWERS
WGU C702
1. A software company suspects that employees have set up automatic corporate
email forwarding to their personal inboxes against company policy. The
company hires forensic investigators to identify the employees violating policy,
with the intention of issuing warnings to them.
Which type of cybercrime investigation approach is this
company taking? Administrative
Civil
Criminal
Administrative
Punitive
2. Which model or legislation applies a holistic approach toward any criminal
activity as a criminal operation? Enterprise Theory of Investigation
Enterprise Theory of Investigation
Racketeer Influenced and Corrupt Organizations Act
Evidence Examination
Law Enforcement Cyber Incident Reporting
,3. What does a forensic investigator need to obtain before seizing a computing
device in a criminal case? - Court warrant
Court warrant
Completed crime report
Chain of custody document
Plaintiff's permission
4. Which activity should be used to check whether an application has ever been
installed on a computer? Log review
Penetration test
Risk analysis
Log review
Security review
5. Which characteristic describes an organization's forensic readiness in the
context of cybercrimes? It includes cost considerations.
It includes moral considerations.
It includes cost considerations.
It excludes nontechnical actions.
It excludes technical actions.
, 6. A cybercrime investigator identifies a Universal Serial Bus (USB) memory stick
containing emails as a primary piece of evidence. Those who obtain access to the
de- vice
Who must sign the chain of custody document once the USB
stick is in evidence?
Those who obtain access to the device
Anyone who has ever used the device
Recipients of emails on the device
Authors of emails on the device
7. Which type of attack is a denial-of-service technique that sends a large amount
of data to overwhelm system resources? Mail bombing
Phishing
Spamming
Mail bombing
Bluejacking
8. Which computer crime forensics step requires an in- vestigator to duplicate
and image the collected digital information? Acquiring data
Securing evidence
Acquiring data
Analyzing data
Assessing evidence