Cybersecurity OBJECTIVE
ASSESSMENT ACTUAL EXAM 2025/2026
COMPLETE QUESTIONS WITH VERIFIED
CORRECT ANSWERS || 100%
GUARANTEED PASS
<NEWEST VERSION>
1. Anti-forensics - ANSWER ✓ The actions that perpetrators take to conceal
their locations, activities, or identities.
2. Cell-phone forensics - ANSWER ✓ The process of searching the contents of
cell phones.
3. Chain of custody - ANSWER ✓ The continuity of control of evidence that
makes it possible to account for all that has happened to evidence between
its original collection and its appearance in court, preferably unaltered
4. Computer forensics - ANSWER ✓ The use of analytical and investigative
techniques to identify, collect, examine and preserve computer-based
material for presentation as evidence in a court of law
5. Curriculum Vitae (CV) - ANSWER ✓ An extensive document expounding
one's experience and qualifications for a position, similar to a resume but
with more detail. In academia and expert work, a CV is usually used rather
than a resume
6. Daubert Standard - ANSWER ✓ The standard holding that only methods
and tools widely accepted in the scientific community can be used in court.
,7. Demonstrative Evidence - ANSWER ✓ Information that helps explain other
evidence. And example is a chart that explains a technical concept to the
judge and jury
8. Digital Evidence - ANSWER ✓ Information that has been processed and
assembled so that it is relevant to an investigation and supports a specific
finding or determination
9. Disk Forensics - ANSWER ✓ The process of acquiring and analyzing
information stored on physical storage media, such as computer hard drives
or smartphones
10.Documentary Evidence - ANSWER ✓ Data stored in written form, on paper
or in electronic files, such as email messages and telephone call-detail
records. Investigators must authenticate documentary evidence.
11.Email Forensics - ANSWER ✓ The study of the source and content of email
as evidence, including the identification of the sender, recipient, date, time,
and origination location of an email message.
12.ECPA (Electronic Communications Privacy Act) - ANSWER ✓ prohibits
interception and disclosure of wire, oral, or electronic communications
without employee consent
13.18 U.S.C. 2252B - ANSWER ✓ Misleading domains on Internet to bait the
underage
14.CALEA (Communications Assistance for Law Enforcement Act) -
ANSWER ✓ requires the telecommunications industry to build tools into its
products that federal investigators can use—after gaining a court order—to
eavesdrop on conversations and intercept electronic communications.
15.FISA (Foreign Intelligence Surveillance Act) - ANSWER ✓ A special court
that approves electronic eavesdropping on foreign spies
16.CSA - ANSWER ✓ must have at least minimal security practices in place
,17.USA Patriot Act - ANSWER ✓ Act that gives federal officials greater
authority to take measures to combat terrorism.
18.Child protect and sex predator act - ANSWER ✓ Service provider must
report cp
19.Communication Decency Act - ANSWER ✓ Act to regulate obscenity
available through the Internet and online communications.
20.Telecommunications Act of 1996 - ANSWER ✓ federal legislation that
deregulated the communications media
21.The Wireless Communications and Public Safety Act of 1999 - ANSWER ✓
Allows for collection and use of "empty" communications, which means
nonverbal and nontext communications, such as GPS information.
22.SOX (Sarbanes-Oxley Act) - ANSWER ✓ Requires companies to review
internal control and take responsibility for the accuracy and completeness of
their financial reports.
23.18 USC 1030 - ANSWER ✓ Fraud and related activity in connection with
computers
24.18 usc 1020 - ANSWER ✓ Addresses fraud related to access devices.
(Router)
25.DCMA (Digital Millennium Copyright Act) - ANSWER ✓ Prohibition of
attempts to circument copyright protection mechanisms placed on protected
works. Protects digital media. Penalties of $1,000,000 and 10 years
imprisonment. Non-profits and schools are exempt. Limits liability of ISP's
under certain circumstances
26.18 USC 1028(a) - ANSWER ✓ identity theft
27.18 usc 2251 - ANSWER ✓ Sexual exploitation of children
28.18 USC 2260 - ANSWER ✓ Production of sexually explicit depictions of a
minor for importation into the US
, 29.18 usc 2252 - ANSWER ✓ Makes it illegal to distribute child pornography
30.18 usc 2252a - ANSWER ✓ Certain activities relating to material
constituting or containing child pornography
31.NIST 800-34 - ANSWER ✓ The Business Continuity plan guidelines are
defined
32.Federal Privacy Act of 1974 - ANSWER ✓ Regulates what personal
information the Federal government can collect about private individuals
33.Which storage tech uses NAND? - ANSWER ✓ SSD
34.What uses AFF file format? - ANSWER ✓ Autopsy and Sleuth Kit
35.What law applies to collection of GPS location data? - ANSWER ✓ The
Wireless Communications and Public Safety Act of 1999
36.What law applies to intercepting communications with the computer owner's
permission? - ANSWER ✓ 18 U.S.C. 2511 is the embodiment of the
Electronic Communications Privacy Act (ECPA) of 1986 into criminal law.
It is a crime to intentionally intercept, disclose, or use any wire, oral, or
electronic communication in violation of federal law.This law applies to any
person who is not a party to the communication and who intentionally
intercepts, discloses, or uses that communication without the consent of at
least one party.
37.Where do deleted Apple iphone/ipad files go? - ANSWER ✓ /.Trashes/501
38.Which types of data are the authorities allowed to get from service
providers? - ANSWER ✓ The ECPA requires different legal processes to
obtain specific types of information:
*Basic subscriber information*: includes name, address, billing information
including a credit card number, telephone toll billing records, subscriber's
telephone number, type of service, and length of service. An investigator can
obtain this type of information with a subpoena, court order, or search
warrant.