100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU - D431 DIGITAL FORENSICS IN CYBERSECURITY EXAM QUESTIONS WITH CORRECT DETAILED ANSWERS || ALREADY GRADED A+ < LATEST VERSION >

Rating
-
Sold
-
Pages
42
Grade
A+
Uploaded on
28-02-2025
Written in
2024/2025

WGU - D431 DIGITAL FORENSICS IN CYBERSECURITY EXAM QUESTIONS WITH CORRECT DETAILED ANSWERS || ALREADY GRADED A+ &lt; LATEST VERSION &gt; 1. Which law requires both parties to consent to the recording of a conversation? A. Electronic Communications Privacy (ECPA) B. Communications Assistance to Law Enforcement Act (CALEA) C. USA Patriot Act D. Health Insurance Portability and Accountability Act (HIPPA) - ANSWER A. Electronic Communication Privacy (ECPA) 2. Which law is related to the disclosure of personally identifiable protected health information (PHI)? A. Federal Privacy Act of 1974 B. Electronic Communication Privacy Act C. Health Insurance Portability and Accountability Act (HIPAA) D. CAN-SPAM Act - ANSWER C. Health Insurance Portability and Accountability Act (HIPAA) 3. A forensic scientist arrives at a crime scene to begin collecting evidence. What is the first thing the forensic scientist should do? A. Photograph all evidence in its original place B. Unplug all network connections so data cannot be deleted remotely C. Turn off the power to the entire area being examited D. Gather up all physical evidence and move it out as quickly as possible - ANSWER A. Photograph all evidence in its original place. 4. Which method of copying digital evidence ensures proper evidence collection? A. Make the copy at the bit level B. Copy files using drag and drop C. Make the copy using file transfer D. Copy the logical partitions - ANSWER A. Make the copy at the bit level. 5. A computer involved in a crime is infected with malware. The computer is on and connected to the company's network. The forensic investigator arrives at the scene. Which action should be the investigator's first step? A. Unplug the computer's Ethernet Cable B. Unplug the computer's power cord C. Remove the malware and secure the computer D. Label all the attachments and secure the computer - ANSWER A. Unplug the computer's Ethernet Cable. 6. What are the three basic tasks that a system forensic specialist must keep in mind when handling evidence during a cybercrime investigation? Answer options may be used more than once or not all Select your answers from the pull-down list. A. Find evidence B. Catalog evidence C. Disseminate evidence D. Preserve evidence E. Prepare evidence F. Prepare evidence report G. Make multiple copies of evidence - ANSWER A. Find Evidence D. Preserve Evidence E. Prepare Evidence 7. How do forensic specialists show that digital evidence was handled in a protected, secure manner during the process of collecting and analyzing the evidence? A. Forensic lab logbooks B. Chain of custody C. Forensic Software logs D. Chain of email messages - ANSWER B. Chain of custody 8. Which characteristic applies to magnetic drives compared to solid state drives (ssds)? A. Lower cost B. Lower capacity C. Lower Power consumption D. Better durability - ANSWER A. Lower cost 9. Which characteristic applies to solid-state drives (ssds) compared to magnetic drives? A. They are less susceptible to damage B. They cost less C. They have slower start-up times D. They use more power - ANSWER A. They are less susceptible to damage 10. Which type of storage format should be transported in a special bag to reduce electrostatic interference? A. Solid-state drives B. Optical Media C. Digitial Audio Tapes D. Magnetic Media - ANSWER D. Magnetic media 11. Which Windows component is responsible for reading the boot ini file and displaying the boot loader menu on Windows XP during the boot process? A. NTLDR B. NTOSKRNL C. Windows Registry D. Win32 subsystem - ANSWER A. NTLDR 12. The following line of code is a example of how to make a forensic copy of the suspect drive: - ANSWER D. Linux 13. 14. Which file system is supported by Mac? A. Berkeley Fast File System (FFS) B. Extended File System (Ext) C. Reiser File System (reiserfs) D. Hierarchical File System Plus (HFS+) - ANSWER D. Hierarchical File System Plus (HFS+) Where are local passwords stored for the Windows operating System? A. SAM file in WindowsSystem32 B. SAM file in WindowsSecurity C. In the registry key HKEY_LOCAL_MACHINESYSTEM D. In the registry key HKEY_LOCAL_MACHINESECURITY - ANSWER A. SAM file in WindowsSystem32

Show more Read less
Institution
WGU - D431
Course
WGU - D431











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU - D431
Course
WGU - D431

Document information

Uploaded on
February 28, 2025
Number of pages
42
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU - D431 DIGITAL FORENSICS
IN CYBERSECURITY EXAM
QUESTIONS WITH CORRECT
DETAILED ANSWERS || ALREADY
GRADED A+ < LATEST VERSION >




1. Which law requires both parties to consent to the recording of a
conversation?
A. Electronic Communications Privacy (ECPA)
B. Communications Assistance to Law Enforcement Act
(CALEA)
C. USA Patriot Act
D. Health Insurance Portability and Accountability Act (HIPPA)
- ANSWER 🗸 A. Electronic Communication Privacy
(ECPA)

2. Which law is related to the disclosure of personally identifiable
protected health information (PHI)?
A. Federal Privacy Act of 1974
B. Electronic Communication Privacy Act
C. Health Insurance Portability and Accountability Act
(HIPAA)
D. CAN-SPAM Act - ANSWER 🗸 C. Health Insurance
Portability and Accountability Act (HIPAA)

,3. A forensic scientist arrives at a crime scene to begin collecting
evidence. What is the first thing the forensic scientist should do?
A. Photograph all evidence in its original place
B. Unplug all network connections so data cannot be deleted
remotely
C. Turn off the power to the entire area being examited
D. Gather up all physical evidence and move it out as quickly as
possible - ANSWER 🗸 A. Photograph all evidence in its
original place.

4. Which method of copying digital evidence ensures proper evidence
collection?
A. Make the copy at the bit level
B. Copy files using drag and drop
C. Make the copy using file transfer
D. Copy the logical partitions - ANSWER 🗸 A. Make the copy
at the bit level.

5. A computer involved in a crime is infected with malware. The
computer is on and connected to the company's network. The
forensic investigator arrives at the scene. Which action should be
the investigator's first step?
A. Unplug the computer's Ethernet Cable
B. Unplug the computer's power cord
C. Remove the malware and secure the computer
D. Label all the attachments and secure the computer -
ANSWER 🗸 A. Unplug the computer's Ethernet Cable.

6. What are the three basic tasks that a system forensic specialist
must keep in mind when handling evidence during a cybercrime
investigation? Answer options may be used more than once or not
all Select your answers from the pull-down list.
A. Find evidence
B. Catalog evidence

, C. Disseminate evidence
D. Preserve evidence
E. Prepare evidence
F. Prepare evidence report
G. Make multiple copies of evidence - ANSWER 🗸 A. Find
Evidence
D. Preserve Evidence
E. Prepare Evidence

7. How do forensic specialists show that digital evidence was handled
in a protected, secure manner during the process of collecting and
analyzing the evidence?
A. Forensic lab logbooks
B. Chain of custody
C. Forensic Software logs
D. Chain of email messages - ANSWER 🗸 B. Chain of custody

8. Which characteristic applies to magnetic drives compared to solid-
state drives (ssds)?
A. Lower cost
B. Lower capacity
C. Lower Power consumption
D. Better durability - ANSWER 🗸 A. Lower cost

9. Which characteristic applies to solid-state drives (ssds) compared
to magnetic drives?
A. They are less susceptible to damage
B. They cost less
C. They have slower start-up times
D. They use more power - ANSWER 🗸 A. They are less
susceptible to damage

10. Which type of storage format should be transported in a
special bag to reduce electrostatic interference?

, A. Solid-state drives
B. Optical Media
C. Digitial Audio Tapes
D. Magnetic Media - ANSWER 🗸 D. Magnetic media

11. Which Windows component is responsible for reading the
boot ini file and displaying the boot loader menu on Windows XP
during the boot process?
A. NTLDR
B. NTOSKRNL
C. Windows Registry
D. Win32 subsystem - ANSWER 🗸 A. NTLDR

12. The following line of code is a example of how to make a
forensic copy of the suspect drive: - ANSWER 🗸 D. Linux

13. Which file system is supported by Mac?
A. Berkeley Fast File System (FFS)
B. Extended File System (Ext)
C. Reiser File System (reiserfs)
D. Hierarchical File System Plus (HFS+) - ANSWER 🗸 D.
Hierarchical File System Plus (HFS+)

14. Where are local passwords stored for the Windows operating
System?
A. SAM file in \Windows\System32\
B. SAM file in \Windows\Security\
C. In the registry key HKEY_LOCAL_MACHINE\SYSTEM
D. In the registry key HKEY_LOCAL_MACHINE\SECURITY
- ANSWER 🗸 A. SAM file in \Windows\System32

15. Where on the Windows system is the config folder located
that contains the SAM file?
A. C:\Windows\System32
$10.39
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
ChrisEliteDocs

Get to know the seller

Seller avatar
ChrisEliteDocs Havard School
View profile
Follow You need to be logged in order to follow users or courses
Sold
5
Member since
1 year
Number of followers
0
Documents
110
Last sold
4 months ago
Elite Study Materials

As a highly respected professional with a focus on sourcing study materials, I offer authentic and dependable exam papers directly acquired from renowned and reputable institutions. These resources are meticulously curated to support aspiring nurses and professionals across various fields in their exam preparation. Leveraging my extensive experience and deep expertise, I ensure that each exam paper is thoughtfully selected and meticulously crafted to meet the highest standards of quality, accuracy, and relevance. These materials are an indispensable component of any effective study plan, designed to help you achieve success.

Read more Read less
0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions