WGUMaster's
CourseC702-
Forensicsand
Network
Intrusion
, WGU Master's Course C702 - Forensics and Network
Intrusion With Complete Solution
ALsoftwareLcompanyLsuspectsLthatLemployeesLhaveLsetLupLautomaticLcorporateLemailLfor
wardingLtoLtheirLpersonalLinboxesLagainstLcompanyLpolicy.LTheLcompanyLhiresLforensicLi
nvestigatorsLtoLidentifyLtheLemployeesLviolatingLpolicy,LwithLtheLintentionLofLissuingLwarni
ngsLtoLthem.
WhichLtypeLofLcybercrimeLinvestigationLapproachLisLthisLcompanyLtaking?
ALCivil
BLCriminal
CLAdministrative
DLPunitiveL-CORRECTLANSWER C
WhichLmodelLorLlegislationLappliesLaLholisticLapproachLtowardLanyLcriminalLactivityLasLaLcri
minalLoperation?
ALEnterpriseLTheoryLofLInvestigation
BLRacketeerLInfluencedLandLCorruptLOrganizationsLAct
CLEvidenceLExamination
DLLawLEnforcementLCyberLIncidentLReportingL-CORRECTLANSWER A
WhatLdoesLaLforensicLinvestigatorLneedLtoLobtainLbeforeLseizingLaLcomputingLdeviceLinLaLcr
iminalLcase?
ALCourtLwarrant
BLCompletedLcrimeLreport
CLChainLofLcustodyLdocument
DLPlaintiff'sLpermissionL-CORRECTLANSWER A
WhichLactivityLshouldLbeLusedLtoLcheckLwhetherLanLapplicationLhasLeverLbeenLinstalledLon
LaLcomputer?
ALPenetrationLtest
BLRiskLanalysis
CLLogLreview
DLSecurityLreviewL-CORRECTLANSWER C
WhichLcharacteristicLdescribesLanLorganization'sLforensicLreadinessLinLtheLcontextLofLcyber
crimes?
ALItLincludesLmoralLconsiderations.
BLItLincludesLcostLconsiderations.
CLItLexcludesLnontechnicalLactions.
, WGU Master's Course C702 - Forensics and Network
Intrusion With Complete Solution
DLItLexcludesLtechnicalLactions.L-CORRECTLANSWER B
ALcybercrimeLinvestigatorLidentifiesLaLUniversalLSerialLBusL(USB)LmemoryLstickLcontainin
gLemailsLasLaLprimaryLpieceLofLevidence.
WhoLmustLsignLtheLchainLofLcustodyLdocumentLonceLtheLUSBLstickLisLinLevidence?
ALThoseLwhoLobtainLaccessLtoLtheLdevice
BLAnyoneLwhoLhasLeverLusedLtheLdevice
CLRecipientsLofLemailsLonLtheLdevice
DLAuthorsLofLemailsLonLtheLdeviceL-CORRECTLANSWER A
WhichLtypeLofLattackLisLaLdenial-of-
serviceLtechniqueLthatLsendsLaLlargeLamountLofLdataLtoLoverwhelmLsystemLresources?
ALPhishing
BLSpamming
CLMailLbombing
DLBluejackingL-CORRECTLANSWER C
WhichLcomputerLcrimeLforensicsLstepLrequiresLanLinvestigatorLtoLduplicateLandLimageLthe
LcollectedLdigitalLinformation?
ALSecuringLevidence
BLAcquiringLdata
CLAnalyzingLdata
DLAssessingLevidenceL-CORRECTLANSWER B
WhatLisLtheLlastLstepLofLaLcriminalLinvestigationLthatLrequiresLtheLinvolvementLofLaLcompute
rLforensicLinvestigator?
ALAnalyzingLtheLdataLcollected
BLTestifyingLinLcourt
CLAssessingLtheLevidence
DLPerformingLsearchLandLseizureL-CORRECTLANSWER B
HowLcanLaLforensicLinvestigatorLverifyLanLAndroidLmobileLdeviceLisLon,LwithoutLpotentiallyLc
hangingLtheLoriginalLevidenceLorLinteractingLwithLtheLoperatingLsystem?
ALCheckLtoLseeLifLitLisLpluggedLintoLaLcomputer
BLTapLtheLscreenLmultipleLtimes
CLLookLforLflashingLlights
DLHoldLdownLtheLpowerLbuttonL-CORRECTLANSWER C
, WGU Master's Course C702 - Forensics and Network
Intrusion With Complete Solution
WhatLshouldLaLforensicLinvestigatorLuseLtoLprotectLaLmobileLdeviceLifLaLFaradayLbagLisLno
tLavailable?
ALAluminumLfoil
BLSturdyLcontainer
CLCardboardLbox
DLBubbleLwrapL-CORRECTLANSWER A
WhichLcriterionLdeterminesLwhetherLaLtechnologyLusedLbyLgovernmentLtoLobtainLinforma
tionLinLaLcomputerLsearchLisLconsideredLinnovativeLandLrequiresLaLsearchLwarrant?
ALAvailabilityLtoLtheLgeneralLpublic
BLDependencyLonLthird-partyLsoftware
CLImplementationLbasedLonLopenLsourceLsoftware
DLUseLofLcloud-basedLmachineLlearningL-CORRECTLANSWER A
WhichLsituationLallowsLaLlawLenforcementLofficerLtoLseizeLaLhardLdriveLfromLaLresidenceLwit
houtLobtainingLaLsearchLwarrant?
ALTheLcomputerLisLleftLunattended.
BLTheLfrontLdoorLisLwideLopen.
CLTheLoccupantLisLactingLsuspicious.
DLTheLevidenceLisLinLimminentLdanger.L-CORRECTLANSWER D
WhichLlegalLdocumentLcontainsLaLsummaryLofLfindingsLandLisLusedLtoLprosecute?
ALInvestigationLreport
BLSearchLwarrant
CLSearchLandLseizure
DLChainLofLcustodyL-CORRECTLANSWER A
WhatLshouldLanLinvestigatorLuseLtoLpreventLanyLsignalsLfromLreachingLaLmobileLphone?
ALFaradayLbag
BLDryLbag
CLAnti-staticLcontainer
DLLockLboxL-CORRECTLANSWER A
ALforensicLinvestigatorLisLcalledLtoLtheLstandLasLaLtechnicalLwitnessLinLanLinternetLpaymen
tLfraudLcase.
WhichLbehaviorLisLconsideredLethicalLbyLthisLinvestigatorLwhileLtestifying?
ALProvidingLandLexplainingLfactsLfoundLduringLtheLinvestigation
CourseC702-
Forensicsand
Network
Intrusion
, WGU Master's Course C702 - Forensics and Network
Intrusion With Complete Solution
ALsoftwareLcompanyLsuspectsLthatLemployeesLhaveLsetLupLautomaticLcorporateLemailLfor
wardingLtoLtheirLpersonalLinboxesLagainstLcompanyLpolicy.LTheLcompanyLhiresLforensicLi
nvestigatorsLtoLidentifyLtheLemployeesLviolatingLpolicy,LwithLtheLintentionLofLissuingLwarni
ngsLtoLthem.
WhichLtypeLofLcybercrimeLinvestigationLapproachLisLthisLcompanyLtaking?
ALCivil
BLCriminal
CLAdministrative
DLPunitiveL-CORRECTLANSWER C
WhichLmodelLorLlegislationLappliesLaLholisticLapproachLtowardLanyLcriminalLactivityLasLaLcri
minalLoperation?
ALEnterpriseLTheoryLofLInvestigation
BLRacketeerLInfluencedLandLCorruptLOrganizationsLAct
CLEvidenceLExamination
DLLawLEnforcementLCyberLIncidentLReportingL-CORRECTLANSWER A
WhatLdoesLaLforensicLinvestigatorLneedLtoLobtainLbeforeLseizingLaLcomputingLdeviceLinLaLcr
iminalLcase?
ALCourtLwarrant
BLCompletedLcrimeLreport
CLChainLofLcustodyLdocument
DLPlaintiff'sLpermissionL-CORRECTLANSWER A
WhichLactivityLshouldLbeLusedLtoLcheckLwhetherLanLapplicationLhasLeverLbeenLinstalledLon
LaLcomputer?
ALPenetrationLtest
BLRiskLanalysis
CLLogLreview
DLSecurityLreviewL-CORRECTLANSWER C
WhichLcharacteristicLdescribesLanLorganization'sLforensicLreadinessLinLtheLcontextLofLcyber
crimes?
ALItLincludesLmoralLconsiderations.
BLItLincludesLcostLconsiderations.
CLItLexcludesLnontechnicalLactions.
, WGU Master's Course C702 - Forensics and Network
Intrusion With Complete Solution
DLItLexcludesLtechnicalLactions.L-CORRECTLANSWER B
ALcybercrimeLinvestigatorLidentifiesLaLUniversalLSerialLBusL(USB)LmemoryLstickLcontainin
gLemailsLasLaLprimaryLpieceLofLevidence.
WhoLmustLsignLtheLchainLofLcustodyLdocumentLonceLtheLUSBLstickLisLinLevidence?
ALThoseLwhoLobtainLaccessLtoLtheLdevice
BLAnyoneLwhoLhasLeverLusedLtheLdevice
CLRecipientsLofLemailsLonLtheLdevice
DLAuthorsLofLemailsLonLtheLdeviceL-CORRECTLANSWER A
WhichLtypeLofLattackLisLaLdenial-of-
serviceLtechniqueLthatLsendsLaLlargeLamountLofLdataLtoLoverwhelmLsystemLresources?
ALPhishing
BLSpamming
CLMailLbombing
DLBluejackingL-CORRECTLANSWER C
WhichLcomputerLcrimeLforensicsLstepLrequiresLanLinvestigatorLtoLduplicateLandLimageLthe
LcollectedLdigitalLinformation?
ALSecuringLevidence
BLAcquiringLdata
CLAnalyzingLdata
DLAssessingLevidenceL-CORRECTLANSWER B
WhatLisLtheLlastLstepLofLaLcriminalLinvestigationLthatLrequiresLtheLinvolvementLofLaLcompute
rLforensicLinvestigator?
ALAnalyzingLtheLdataLcollected
BLTestifyingLinLcourt
CLAssessingLtheLevidence
DLPerformingLsearchLandLseizureL-CORRECTLANSWER B
HowLcanLaLforensicLinvestigatorLverifyLanLAndroidLmobileLdeviceLisLon,LwithoutLpotentiallyLc
hangingLtheLoriginalLevidenceLorLinteractingLwithLtheLoperatingLsystem?
ALCheckLtoLseeLifLitLisLpluggedLintoLaLcomputer
BLTapLtheLscreenLmultipleLtimes
CLLookLforLflashingLlights
DLHoldLdownLtheLpowerLbuttonL-CORRECTLANSWER C
, WGU Master's Course C702 - Forensics and Network
Intrusion With Complete Solution
WhatLshouldLaLforensicLinvestigatorLuseLtoLprotectLaLmobileLdeviceLifLaLFaradayLbagLisLno
tLavailable?
ALAluminumLfoil
BLSturdyLcontainer
CLCardboardLbox
DLBubbleLwrapL-CORRECTLANSWER A
WhichLcriterionLdeterminesLwhetherLaLtechnologyLusedLbyLgovernmentLtoLobtainLinforma
tionLinLaLcomputerLsearchLisLconsideredLinnovativeLandLrequiresLaLsearchLwarrant?
ALAvailabilityLtoLtheLgeneralLpublic
BLDependencyLonLthird-partyLsoftware
CLImplementationLbasedLonLopenLsourceLsoftware
DLUseLofLcloud-basedLmachineLlearningL-CORRECTLANSWER A
WhichLsituationLallowsLaLlawLenforcementLofficerLtoLseizeLaLhardLdriveLfromLaLresidenceLwit
houtLobtainingLaLsearchLwarrant?
ALTheLcomputerLisLleftLunattended.
BLTheLfrontLdoorLisLwideLopen.
CLTheLoccupantLisLactingLsuspicious.
DLTheLevidenceLisLinLimminentLdanger.L-CORRECTLANSWER D
WhichLlegalLdocumentLcontainsLaLsummaryLofLfindingsLandLisLusedLtoLprosecute?
ALInvestigationLreport
BLSearchLwarrant
CLSearchLandLseizure
DLChainLofLcustodyL-CORRECTLANSWER A
WhatLshouldLanLinvestigatorLuseLtoLpreventLanyLsignalsLfromLreachingLaLmobileLphone?
ALFaradayLbag
BLDryLbag
CLAnti-staticLcontainer
DLLockLboxL-CORRECTLANSWER A
ALforensicLinvestigatorLisLcalledLtoLtheLstandLasLaLtechnicalLwitnessLinLanLinternetLpaymen
tLfraudLcase.
WhichLbehaviorLisLconsideredLethicalLbyLthisLinvestigatorLwhileLtestifying?
ALProvidingLandLexplainingLfactsLfoundLduringLtheLinvestigation