WGU D431 DIGITAL FORENSICS OBJECTIVE ASSESS
d d d d d
MENT NEWEST ACTUAL EXAM COMPLETE 200 QUE
d d d d d d
STIONS AND CORRECT DETAILED ANSWERS (VERI d d d d d
FIE ANSWERS) |ALREADY GRADED A+||BRAND NEW!
d d d d d
!
Which law requires both parties to consent to the recording of a conv
d d d d d d d d d d d d
ersation? - d
ANSWER >>>>ECPA (Electronic Communications Privacy Act)
d d d d d d
Which law is related to the disclosure of personally identifiable prote
d d d d d d d d d d
cted health information (PHI)? -
d d d d
dANSWER >>>>Health Insurance Portability and Accountability Act
d d d d d d d
(HIPAA)
Which U.S. law criminalizes the act of knowingly using a misleading
d d d d d d d d d d d
domain name with the intent to deceive a minor into viewing harmful
d d d d d d d d d d d d
material? - ANSWER >>>>18 U.S.C. 2252B
d d d d d
Which U.S. law protects journalists from turning over their work or so
d d d d d d d d d d d
urces to law enforcement before the information is shared with the p
d d d d d d d d d d d
ublic? - ANSWER >>>>The Privacy Protection Act (PPA)
d d d d d d d
Which law or guideline lists the four states a mobile device can be in
d d d d d d d d d d d d d d
when data is extracted from it? - ANSWER >>>>NIST SP 800-
d d d d d d d d d d
72 Guidelines
d d
Which law includes a provision permitting the wiretapping of VoIP ca
d d d d d d d d d d
lls? - d
dANSWER >>>>Communications Assistance to Law Enforcement
d d d d d d
Act (CALEA)
d
Which policy is included in the CAN-SPAM Act? - ANSWER
d d d d d d d d d
>>>>The email sender must provide some mechanism whereby
d d d d d d d
,the receiver can opt out of future emails and that method cannot req
d d d d d d d d d d d d
uire the receiver to pay in order to opt out.
d d d d d d d d d
Which United States law requires telecommunications equipment
d d d d d d d
manufacturers to provide built- d d d
in surveillance capabilities for federal agencies? -
d d d d d d
dANSWER >>>>Communication Assistance to Law Enforcement Ac d d d d d d
t (CALEA)
d
Which law requires a search warrant or one of the recognized excep
d d d d d d d d d d d
tions to the search warrant requirements for searching email messa
d d d d d d d d d
ges on a computer? - d d d d
dANSWER >>>>The Fourth Amendment to the U.S. Constitution d d d d d d d
Where are local passwords stored for the Windows operating syste
d d d d d d d d d
m? - ANSWER >>>>SAM file in \Windows\System32\
d d d d d d
Where on a Windows system is the config folder located that contain
d d d d d d d d d d d
s the SAM file? - ANSWER >>>>C:\Windows\System32
d d d d d d
A forensic examiner wants to try to extract passwords for wireless ne
d d d d d d d d d d d
tworks to which a system was connected. Where should passwords
d d d d d d d d d d
for wireless networks be stored on a Windows XP system? -
d d d d d d d d d d
dANSWER >>>>Registry d
Which Windows password cracking tool uses rainbow tables? -
d d d d d d d d
ANSWER >>>>Ophcrack
d d
How does a rainbow table work to crack a password? - ANSWER
d d d d d d d d d d d
>>>>It uses a table of all possible keyboard combinations and their
d d d d d d d d d d d
hash values, then searches for a match.
d d d d d d
What should a forensic investigator use to gather the most reliable r
d d d d d d d d d d d
outing information for tracking an email message? -
d d d d d d d
ANSWER >>>>Email header
d d d
,Which activity involves email tracing? - ANSWER
d d d d d d
>>>>Determining the ownership of the source email server d d d d d d d
A forensic examiner reviews a laptop running OS X which has been
d d d d d d d d d d d d
compromised. The examiner wants to know if there were any mount d d d d d d d d d d
ed volumes created from USB drives. Which digital evidence shoul
d d d d d d d d d
d be reviewed? - ANSWER >>>>/var/log
d d d d d
Which log or folder contains information about printed documents on
d d d d d d d d d
a computer running Mac OS X? - ANSWER
d d d d d d d d
>>>>/var/spool/cups
Which Windows event log should be checked for evidence of invalid
d d d d d d d d d d d
logon attempts? - ANSWER >>>>Security
d d d d
A cyber security organization has issued a warning about a cybercri
d d d d d d d d d d
minal who is using a known vulnerability to attack unpatched corpor
d d d d d d d d d d
ate Macintosh systems. A network administrator decides to examin
d d d d d d d d
e the software updates logs on a Macintosh system to ensure the sy
d d d d d d d d d d d d
stem has been patched. Which folder contains the software updates
d d d d d d d d d
logs? - ANSWER
d d d
>>>>/Library/Receipts
A forensic investigator wants to image an older BlackBerry smartph
d d d d d d d d d
one running OS 7.0. Which tool should the investigator use? -
d d d d d d d d d d
ANSWER >>>>BlackBerry Desktop Manager
d d d d
An investigator wants to extract information from a mobile device by
d d d d d d d d d d d
connecting it to a computer. What should the investigator take great
d d d d d d d d d d d
care to ensure? - d d d
ANSWER >>>>That the mobile device does not synchronize with t
d d d d d d d d d d
he computer
d
Which state is a device in if it is powered on, performing tasks, and a
d d d d d d d d d d d d d d
ble to be manipulated by the user? - ANSWER >>>>Active
d d d d d d d d d
, The chief information officer of an accounting firm believes sensitive
d d d d d d d d d
data is being exposed on the local network. Which tool should the IT
d d d d d d d d d d d d d d
staff use to gather digital evidence about this security vulnerability? -
d d d d d d d d d d
ANSWER >>>>Sniffer
d d
A police detective investigating a threat traces the source to a house
d d d d d d d d d d d
. The couple at the house shows the detective the only computer the
d d d d d d d d d d d d
dfamily owns, which is in their son's bedroom. The couple states that
d d d d d d d d d d d d
their son is presently in class at a local middle school. How should th
d d d d d d d d d d d d d
e detective legally gain access to the computer? -
d d d d d d d d
dANSWER >>>>Obtain consent to search from the parents d d d d d d d
How should a forensic scientist obtain the network configuration fro
d d d d d d d d d
m a Windows PC before seizing it from a crime scene? -
d d d d d d d d d d d
ANSWER >>>>By using the ipconfig command from a command pr
d d d d d d d d d d
ompt on the computer d d d
The human resources manager of a small accounting firm believes
d d d d d d d d d d
he may have been a victim of a phishing scam. The manager clicked
d d d d d d d d d d d d
don a link in an email message that asked him to verify the logon cred
d d d d d d d d d d d d d d
entials for the firm's online bank account.
d d d d d d
Which digital evidence should a forensic investigator collect to inves
d d d d d d d d d
tigate this incident? - ANSWER >>>>Browser Cache
d d d d d d
After a company's single- d d d
purpose, dedicated messaging server is hacked by a cybercriminal,
d d d d d d d d d
a forensics expert is hired to investigate the crime and collect eviden
d d d d d d d d d d d
ce.Which digital evidence should be collected? - d d d d d d
ANSWER >>>>Firewall Logs
d d d
Thomas received an email stating that he needed to follow a link and
d d d d d d d d d d d d
verify his bank account information to ensure it was secure. Shortly
d d d d d d d d d d d d
after following the instructions, Thomas noticed money was missing
d d d d d d d d
from his account. Which digital evidence should be
d d d d d d d d
d d d d d
MENT NEWEST ACTUAL EXAM COMPLETE 200 QUE
d d d d d d
STIONS AND CORRECT DETAILED ANSWERS (VERI d d d d d
FIE ANSWERS) |ALREADY GRADED A+||BRAND NEW!
d d d d d
!
Which law requires both parties to consent to the recording of a conv
d d d d d d d d d d d d
ersation? - d
ANSWER >>>>ECPA (Electronic Communications Privacy Act)
d d d d d d
Which law is related to the disclosure of personally identifiable prote
d d d d d d d d d d
cted health information (PHI)? -
d d d d
dANSWER >>>>Health Insurance Portability and Accountability Act
d d d d d d d
(HIPAA)
Which U.S. law criminalizes the act of knowingly using a misleading
d d d d d d d d d d d
domain name with the intent to deceive a minor into viewing harmful
d d d d d d d d d d d d
material? - ANSWER >>>>18 U.S.C. 2252B
d d d d d
Which U.S. law protects journalists from turning over their work or so
d d d d d d d d d d d
urces to law enforcement before the information is shared with the p
d d d d d d d d d d d
ublic? - ANSWER >>>>The Privacy Protection Act (PPA)
d d d d d d d
Which law or guideline lists the four states a mobile device can be in
d d d d d d d d d d d d d d
when data is extracted from it? - ANSWER >>>>NIST SP 800-
d d d d d d d d d d
72 Guidelines
d d
Which law includes a provision permitting the wiretapping of VoIP ca
d d d d d d d d d d
lls? - d
dANSWER >>>>Communications Assistance to Law Enforcement
d d d d d d
Act (CALEA)
d
Which policy is included in the CAN-SPAM Act? - ANSWER
d d d d d d d d d
>>>>The email sender must provide some mechanism whereby
d d d d d d d
,the receiver can opt out of future emails and that method cannot req
d d d d d d d d d d d d
uire the receiver to pay in order to opt out.
d d d d d d d d d
Which United States law requires telecommunications equipment
d d d d d d d
manufacturers to provide built- d d d
in surveillance capabilities for federal agencies? -
d d d d d d
dANSWER >>>>Communication Assistance to Law Enforcement Ac d d d d d d
t (CALEA)
d
Which law requires a search warrant or one of the recognized excep
d d d d d d d d d d d
tions to the search warrant requirements for searching email messa
d d d d d d d d d
ges on a computer? - d d d d
dANSWER >>>>The Fourth Amendment to the U.S. Constitution d d d d d d d
Where are local passwords stored for the Windows operating syste
d d d d d d d d d
m? - ANSWER >>>>SAM file in \Windows\System32\
d d d d d d
Where on a Windows system is the config folder located that contain
d d d d d d d d d d d
s the SAM file? - ANSWER >>>>C:\Windows\System32
d d d d d d
A forensic examiner wants to try to extract passwords for wireless ne
d d d d d d d d d d d
tworks to which a system was connected. Where should passwords
d d d d d d d d d d
for wireless networks be stored on a Windows XP system? -
d d d d d d d d d d
dANSWER >>>>Registry d
Which Windows password cracking tool uses rainbow tables? -
d d d d d d d d
ANSWER >>>>Ophcrack
d d
How does a rainbow table work to crack a password? - ANSWER
d d d d d d d d d d d
>>>>It uses a table of all possible keyboard combinations and their
d d d d d d d d d d d
hash values, then searches for a match.
d d d d d d
What should a forensic investigator use to gather the most reliable r
d d d d d d d d d d d
outing information for tracking an email message? -
d d d d d d d
ANSWER >>>>Email header
d d d
,Which activity involves email tracing? - ANSWER
d d d d d d
>>>>Determining the ownership of the source email server d d d d d d d
A forensic examiner reviews a laptop running OS X which has been
d d d d d d d d d d d d
compromised. The examiner wants to know if there were any mount d d d d d d d d d d
ed volumes created from USB drives. Which digital evidence shoul
d d d d d d d d d
d be reviewed? - ANSWER >>>>/var/log
d d d d d
Which log or folder contains information about printed documents on
d d d d d d d d d
a computer running Mac OS X? - ANSWER
d d d d d d d d
>>>>/var/spool/cups
Which Windows event log should be checked for evidence of invalid
d d d d d d d d d d d
logon attempts? - ANSWER >>>>Security
d d d d
A cyber security organization has issued a warning about a cybercri
d d d d d d d d d d
minal who is using a known vulnerability to attack unpatched corpor
d d d d d d d d d d
ate Macintosh systems. A network administrator decides to examin
d d d d d d d d
e the software updates logs on a Macintosh system to ensure the sy
d d d d d d d d d d d d
stem has been patched. Which folder contains the software updates
d d d d d d d d d
logs? - ANSWER
d d d
>>>>/Library/Receipts
A forensic investigator wants to image an older BlackBerry smartph
d d d d d d d d d
one running OS 7.0. Which tool should the investigator use? -
d d d d d d d d d d
ANSWER >>>>BlackBerry Desktop Manager
d d d d
An investigator wants to extract information from a mobile device by
d d d d d d d d d d d
connecting it to a computer. What should the investigator take great
d d d d d d d d d d d
care to ensure? - d d d
ANSWER >>>>That the mobile device does not synchronize with t
d d d d d d d d d d
he computer
d
Which state is a device in if it is powered on, performing tasks, and a
d d d d d d d d d d d d d d
ble to be manipulated by the user? - ANSWER >>>>Active
d d d d d d d d d
, The chief information officer of an accounting firm believes sensitive
d d d d d d d d d
data is being exposed on the local network. Which tool should the IT
d d d d d d d d d d d d d d
staff use to gather digital evidence about this security vulnerability? -
d d d d d d d d d d
ANSWER >>>>Sniffer
d d
A police detective investigating a threat traces the source to a house
d d d d d d d d d d d
. The couple at the house shows the detective the only computer the
d d d d d d d d d d d d
dfamily owns, which is in their son's bedroom. The couple states that
d d d d d d d d d d d d
their son is presently in class at a local middle school. How should th
d d d d d d d d d d d d d
e detective legally gain access to the computer? -
d d d d d d d d
dANSWER >>>>Obtain consent to search from the parents d d d d d d d
How should a forensic scientist obtain the network configuration fro
d d d d d d d d d
m a Windows PC before seizing it from a crime scene? -
d d d d d d d d d d d
ANSWER >>>>By using the ipconfig command from a command pr
d d d d d d d d d d
ompt on the computer d d d
The human resources manager of a small accounting firm believes
d d d d d d d d d d
he may have been a victim of a phishing scam. The manager clicked
d d d d d d d d d d d d
don a link in an email message that asked him to verify the logon cred
d d d d d d d d d d d d d d
entials for the firm's online bank account.
d d d d d d
Which digital evidence should a forensic investigator collect to inves
d d d d d d d d d
tigate this incident? - ANSWER >>>>Browser Cache
d d d d d d
After a company's single- d d d
purpose, dedicated messaging server is hacked by a cybercriminal,
d d d d d d d d d
a forensics expert is hired to investigate the crime and collect eviden
d d d d d d d d d d d
ce.Which digital evidence should be collected? - d d d d d d
ANSWER >>>>Firewall Logs
d d d
Thomas received an email stating that he needed to follow a link and
d d d d d d d d d d d d
verify his bank account information to ensure it was secure. Shortly
d d d d d d d d d d d d
after following the instructions, Thomas noticed money was missing
d d d d d d d d
from his account. Which digital evidence should be
d d d d d d d d