100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU D431 DIGITAL FORENSICS OBJECTIVE ASSESSEMENT WITH ACTUAL CORRECT QUESTIONS AND VERIFIED DETAILED ANSWERS |FREQUENTLY TESTED QUESTIONS AND SOLUTIONS |ALREADY GRADED A+|NEWEST|GUARANTEED PASS|LATEST UPDATE

Rating
-
Sold
-
Pages
3
Uploaded on
07-02-2025
Written in
2024/2025

WGU D431 DIGITAL FORENSICS OBJECTIVE ASSESSEMENT WITH ACTUAL CORRECT QUESTIONS AND VERIFIED DETAILED ANSWERS |FREQUENTLY TESTED QUESTIONS AND SOLUTIONS |ALREADY GRADED A+|NEWEST|GUARANTEED PASS|LATEST UPDATE

Institution
WGU D431 DIGITAL FORENSICS OBJECTIVE ASSESSEMENT
Course
WGU D431 DIGITAL FORENSICS OBJECTIVE ASSESSEMENT








Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU D431 DIGITAL FORENSICS OBJECTIVE ASSESSEMENT
Course
WGU D431 DIGITAL FORENSICS OBJECTIVE ASSESSEMENT

Document information

Uploaded on
February 7, 2025
Number of pages
3
Written in
2024/2025
Type
Exam (elaborations)
Contains
Unknown

Subjects

Content preview

WGU D431 DIGITAL FORENSICS OBJECTIVE ASSESSEMENT WITH ACTUAL
CORRECT QUESTIONS AND VERIFIED DETAILED ANSWERS |FREQUENTLY TESTED
QUESTIONS AND SOLUTIONS |ALREADY GRADED A+|NEWEST|GUARANTEED
PASS|LATEST UPDATE



Which law requires both parties to consent to the recording of a conversation? - correct answerECPA (Electronic
Communications Privacy Act)

Which law is related to the disclosure of personally identifiable protected health information (PHI)? - correct answerHealth
Insurance Portability and Accountability Act (HIPAA)

Which U.S. law criminalizes the act of knowingly using a misleading domain name with the intent to deceive a minor into
viewing harmful material? - correct answer18 U.S.C. 2252B

Which U.S. law protects journalists from turning over their work or sources to law enforcement before the information is
shared with the public? - correct answerThe Privacy Protection Act (PPA)

Which law or guideline lists the four states a mobile device can be in when data is extracted from it? - correct answerNIST
SP 800-72 Guidelines

Which law includes a provision permitting the wiretapping of VoIP calls? - correct answerCommunications Assistance to
Law Enforcement Act (CALEA)

Which policy is included in the CAN-SPAM Act? - correct answerThe email sender must provide some mechanism
whereby the receiver can opt out of future emails and that method cannot require the receiver to pay in order to opt out.

Which United States law requires telecommunications equipment manufacturers to provide built-in surveillance capabilities
for federal agencies? - correct answerCommunication Assistance to Law Enforcement Act (CALEA)

Which law requires a search warrant or one of the recognized exceptions to the search warrant requirements for searching
email messages on a computer? - correct answerThe Fourth Amendment to the U.S. Constitution

Where are local passwords stored for the Windows operating system? - correct answerSAM file in \Windows\System32\

Where on a Windows system is the config folder located that contains the SAM file? - correct answerC:\Windows\
System32

A forensic examiner wants to try to extract passwords for wireless networks to which a system was connected. Where
should passwords for wireless networks be stored on a Windows XP system? - correct answerRegistry

Which Windows password cracking tool uses rainbow tables? - correct answerOphcrack

How does a rainbow table work to crack a password? - correct answerIt uses a table of all possible keyboard combinations
and their hash values, then searches for a match.

What should a forensic investigator use to gather the most reliable routing information for tracking an email message? -
correct answerEmail header

Which activity involves email tracing? - correct answerDetermining the ownership of the source email server

A forensic examiner reviews a laptop running OS X which has been compromised. The examiner wants to know if there
were any mounted volumes created from USB drives. Which digital evidence should be reviewed? - correct answer/var/log

Which log or folder contains information about printed documents on a computer running Mac OS X? - correct
answer/var/spool/cups

Which Windows event log should be checked for evidence of invalid logon attempts? - correct answerSecurity

A cyber security organization has issued a warning about a cybercriminal who is using a known vulnerability to attack
$11.49
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
TESTB

Get to know the seller

Seller avatar
TESTB Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
3
Member since
1 year
Number of followers
0
Documents
251
Last sold
1 month ago
SMART B

I am a leader in online test prep. I take great pride in our tests and their ability to help you pass your exams. feel free to contact

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions