CORRECT Answers
1. Which of the following is true regarding computer Computer forensics deals
forensics? with the process of finding
evidence related to a digital
crime to find the culprits and
initiate legal action against
them.
2. Which of the following is NOT a objective of comput- Document vulnerabilities al-
er forensics? lowing further loss of intellec-
tual property, finances, and
reputation during an attack.
3. Which of the following is true regarding Enterprise It adopts a holistic approach
Theory of Investigation (ETI)? toward any criminal activity as
a criminal operation rather as
a single criminal act.
4. Forensic readiness refers to: An organization's ability to
make optimal use of digital
evidence in a limited time pe-
riod and with minimal inves-
tigation costs.
5. Which of the following is NOT a element of cyber- Evidence smaller in size.
crime?
6. Which of the following is true of cybercrimes? Investigators, with a warrant,
have the authority to forcibly
seize the computing devices.
7. Which of the following is true of cybercrimes? The initial reporting of the ev-
idence is usually informal.
, WGU C702 CHFI and OA UPDATED ACTUAL Questions and
CORRECT Answers
8. Which of the following is NOT a consideration dur- Value or cost to the victim.
ing a cybercrime investigation?
9. Which of the following is a user-created source of Address book.
potential evidence?
10. Which of the following is a computer-created source Swap file.
of potential evidence?
11. Which of the following is NOT where potential evi- Processor.
dence may be located?
12. Under which of the following conditions will dupli- When original evidence is in
cate evidence NOT suffice? possession of the originator.
13. Which of the following Federal Rules of Evidence Rule 101.
governs proceedings in the courts of the United
States?
14. Which of the following Federal Rules of Evidence Rule 102.
ensures that the truth may be ascertained and the
proceedings justly determined?
15. Which of the following Federal Rules of Evidence Rule 103
contains rulings on evidence?
16. Which of the following Federal Rules of Evidence Rule 105
states that the court shall restrict the evidence to its
proper scope and instruct the jury accordingly?
17. Which of the following refers to a set of method- Computer Forensics.
ological procedures and techniques to identify,
gather, preserve, extract, interpret, document, and
present evidence from computing equipment in
, WGU C702 CHFI and OA UPDATED ACTUAL Questions and
CORRECT Answers
such a manner that the discovered evidence is ac-
ceptable during a legal and/or administrative pro-
ceeding in a court of law?
18. Computer Forensics deals with the process of find- Evidence.
ing related to a digital crime to find the culprits
and initiate legal action against them.
19. Minimizing the tangible and intangible losses to the True.
organization or an individual is considered an es-
sential computer forensics use.
20. Cybercrimes can be classified into the following two Internal and External.
types of attacks, based on the line of attack.
21. Espionage, theft of intellectual property, manipula- Insider attack or primary at-
tion of records, and trojan horse attacks are exam- tacks.
ples of what?
22. External attacks occur when there are inadequate True.
information-security policies and procedures.
23. Which type of cases involve disputes between two Civil.
parties?
24. A computer forensic examiner can investigate any False.
crime as long as he or she takes detailed notes and
follows the appropriate processes.
25. is the standard investigative model used Enterprise Theory of Investi-
by the FBI when conducting investigations against gation (ETI).
major criminal organizations.
26. True.