WGU C702 CHFI and OA | 2025-2026 LATEST UPDATED |
ACTUAL EXAM QUESTIONS WITH SOLUTIONS | 100%
RATED CORRECT | 100% VERFIED SOLTIONS | ALREADY
GRADED A+
Which of the following is true regarding computer forensics? - (ANSWER)Computer forensics
deals with the process of finding evidence related to a digital crime to find the culprits and
initiate legal action against them.
Which of the following is NOT a objective of computer forensics? - (ANSWER)Document
vulnerabilities allowing further loss of intellectual property, finances, and reputation during an
attack.
Which of the following is true regarding Enterprise Theory of Investigation (ETI)? -
(ANSWER)It adopts a holistic approach toward any criminal activity as a criminal operation
rather as a single criminal act.
Forensic readiness refers to: - (ANSWER)An organization's ability to make optimal use of
digital evidence in a limited time period and with minimal investigation costs.
Which of the following is NOT a element of cybercrime? - (ANSWER)Evidence smaller in size.
,2|Page
Which of the following is true of cybercrimes? - (ANSWER)Investigators, with a warrant, have
the authority to forcibly seize the computing devices.
Which of the following is true of cybercrimes? - (ANSWER)The initial reporting of the evidence
is usually informal.
Which of the following is NOT a consideration during a cybercrime investigation? -
(ANSWER)Value or cost to the victim.
Which of the following is a user-created source of potential evidence? - (ANSWER)Address
book.
Which of the following is a computer-created source of potential evidence? - (ANSWER)Swap
file.
Which of the following is NOT where potential evidence may be located? -
(ANSWER)Processor.
,3|Page
Under which of the following conditions will duplicate evidence NOT suffice? -
(ANSWER)When original evidence is in possession of the originator.
Which of the following Federal Rules of Evidence governs proceedings in the courts of the
United States? - (ANSWER)Rule 101.
Which of the following Federal Rules of Evidence ensures that the truth may be ascertained and
the proceedings justly determined? - (ANSWER)Rule 102.
Which of the following Federal Rules of Evidence contains rulings on evidence? -
(ANSWER)Rule 103
Which of the following Federal Rules of Evidence states that the court shall restrict the evidence
to its proper scope and instruct the jury accordingly? - (ANSWER)Rule 105
Which of the following refers to a set of methodological procedures and techniques to identify,
gather, preserve, extract, interpret, document, and present evidence from computing equipment
in such a manner that the discovered evidence is acceptable during a legal and/or administrative
proceeding in a court of law? - (ANSWER)Computer Forensics.
, 4|Page
Computer Forensics deals with the process of finding _____ related to a digital crime to find the
culprits and initiate legal action against them. - (ANSWER)Evidence.
Minimizing the tangible and intangible losses to the organization or an individual is considered
an essential computer forensics use. - (ANSWER)True.
Cybercrimes can be classified into the following two types of attacks, based on the line of attack.
- (ANSWER)Internal and External.
Espionage, theft of intellectual property, manipulation of records, and trojan horse attacks are
examples of what? - (ANSWER)Insider attack or primary attacks.
External attacks occur when there are inadequate information-security policies and procedures. -
(ANSWER)True.
Which type of cases involve disputes between two parties? - (ANSWER)Civil.
A computer forensic examiner can investigate any crime as long as he or she takes detailed notes
and follows the appropriate processes. - (ANSWER)False.