100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU C702 CHFI AND OA EXAM COMPLETE QUESTIONS AND ANSWERS

Rating
-
Sold
-
Pages
24
Grade
A+
Uploaded on
23-09-2025
Written in
2025/2026

WGU C702 CHFI AND OA EXAM COMPLETE QUESTIONS AND ANSWERS .______ is a 128 bit unique reference number used as an identifier in computer software? - Answer-Global Unique Identifier (GUID) .________ command is used to display the network configuration of the NICs on the system. - Answer-ipconfig /all .________ is the standard investigative model used by the FBI when conducting investigations against major criminal organizations. - Answer-Enterprise Theory of Investigation (ETI). .A chain of custody is a critical document in the computer forensics investigation process because the document provides legal validation of appropriate evidence handling. - Answer-True. .A computer forensic examiner can investigate any crime as long as he or she takes detailed notes and follows the appropriate processes. - Answer-False. .An email client connects with a POP3 server via which of the following? - Answer-Port 110. .An investigator may commit some common mistakes while collecting data from the system that result in the loss of critical evidence. Which of the following is NOT a mistake that investigators commonly make? - Answer-Use of correct cables and cabling techniques. .Because they are always changing, the information in the registers or the processor cache are the most volatile data. - Answer-True. .Codes of ethics are the principles stated to describe the expected behavior of an investigator while handling a case. Which of the following is NOT a principle that a computer forensic investigator must follow? - Answer-Provide personal or prejudiced opinions. .Computer Forensics deals with the process of finding _____ related to a digital crime to find the culprits and initiate legal action against them. - Answer-Evidence. .Courts call knowledgable persons to testify to the accuracy of the investigative process. These people who tesify are known as the: - Answer-Expert witnesses. .Cybercrimes can be classified into the following two types of attacks, based on the line of attack. - Answer-Internal and External. .Digital devices store data about session such as user and type of connection. - Answer-True. .Espionage, theft of intellectual property, manipulation of records, and trojan horse attacks are examples of what? - Answer-Insider attack or primary attacks. .External attacks occur when there are inadequate information-security policies and procedures. - Answer-True. .For Forensics Analysis, which of the following MySQL Utility Programs is used to export metadata, data, or both from one or more databases? - Answer-mysqldbexport .Forensic data duplication involves the creation of a file that has every bit of information from the source in a raw bit-stream format. - Answer-True. .Forensic readiness includes technical and nontechnical actions that maximize an organization's competence to use digital evidence. - Answer-True. .Forensic readiness refers to: - Answer-An organization's ability to make optimal use of digital evidence in a limited time period and with minimal investigation costs. .How can an attacker exploit a network? - Answer-Through wired or wireless connections. .How large is the partition table structure that stores information about the partitions present on the hard disk? - Answer-64-byte. .How many bit values does HFS use to address allocation blocks? - Answer-16 .How many bits are used by the MBR partition scheme for storing LBAs (Logical Block Addresses) and the size information on a 512-byte sector? - Answer-32 bits .How should expert witnesses conduct themselves while presenting testimony to any court or attorney? - Answer-Avoid leaning and develop self-confidence. .Identify the following Cloud computing services that enable subscribers to use fundamental IT resources such as computing power, virtualization, data storage, network, and so on- on demand. - Answer-Infrastructure-as-a-service (IaaS) .Identify the following which was launched by the National Institute of Standards and Technology (NIST), that establishes a "methodology for testing computer forensics software tools by development of general tool specifications, test procedures, test criteria, test sets, and test hardware." - Answer-Computer Forensic Tool Testing Project (CFTTP) .Identify which code can be used to obtain the International Mobile Equipment Identifier (IMEI) number on a mobile phone. - Answer-*#06# .In Anti Forensics Techniques, which of the following techniques is used to hide a secret message within an ordinary message and extract it at the destination to maintain confidentiality of data? - Answer-Steganography .In Detecting Rootkits, the following technique is used to compare characteristics of all system processes and executable files with a database of known rootkit fingerprints. - Answer-Signature-Based Detection .In Event Correlation Approaches, which approach is used to monitor the computers and computer users behavior and provide an alert if something anomalous is found? - Answer-Role-based approach .In forensics laws, "authenticating or identifying evidences" comes under which rule? - Answer-Rule 901. .In Linux Standard Tools, forensic investigators use the following build-in Linux Commands to copy data from a disk drive: - Answer-dd and dcfldd .In Port Monitoring, the following command is used to look for connections established to unknown or suspicious IP addresses. - Answer-Netstat -an .In sector, addressing _______ determines the address of the individual sector on the disk. - Answer-Cylinders, Heads, and Sectors (CHS) .in the GUID Partition Table, which Logical Block Address contains the Partition Entry Array? - Answer-LBA 2 .In the Windows Event Log File internals, the following file is used to store the Databases related to the system: - Answer-S .In what type of forensic examination do investigators perform an examination of logs to detect something that has already occurred in a network/device and determine what it is? - Answer-Postmortem .Intruders attempting to gain remote access to a system try to find the other systems connected to the network and visible to the compromised system. - Answer-True. .Investigators can immediately take action after receiving a report of a security incident. - Answer-False. .Investigators can use Linux commands to gather necessary information from the system. Identify the following shell command that is used to display the kernel ring buffer or information about device drivers loaded into the kernel. - Answer-dmesg .Mac OS uses a hierarchical file system. - Answer-True. .Minimizing the tangible and intangible losses to the organization or an individual is considered an essential computer forensics use. - Answer-True. .On demand _______ is a type of service rendered by cloud service providers that allow provisions for cloud resources such as computing power, storage, network, and so on- always on demand, without the need for human interaction with service providers. - Answer-Self service .On Windows 10 OS, by default, the Google Drive Client is installed at which of the following locations? - Answer-C:Program Files (x86)GoogleDrive

Show more Read less
Institution
WGU C702 CHFI And OA
Course
WGU C702 CHFI and OA










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU C702 CHFI and OA
Course
WGU C702 CHFI and OA

Document information

Uploaded on
September 23, 2025
Number of pages
24
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

WGU C702 CHFI AND OA EXAM
COMPLETE QUESTIONS AND
ANSWERS



\.______ is a 128 bit unique reference number used as an identifier in computer software? -
Answer-Global Unique Identifier (GUID)



\.________ command is used to display the network configuration of the NICs on the system. -
Answer-ipconfig /all



\.________ is the standard investigative model used by the FBI when conducting investigations
against major criminal organizations. - Answer-Enterprise Theory of Investigation (ETI).



\.A chain of custody is a critical document in the computer forensics investigation process
because the document provides legal validation of appropriate evidence handling. - Answer-
True.



\.A computer forensic examiner can investigate any crime as long as he or she takes detailed
notes and follows the appropriate processes. - Answer-False.



\.An email client connects with a POP3 server via which of the following? - Answer-Port 110.



\.An investigator may commit some common mistakes while collecting data from the system
that result in the loss of critical evidence. Which of the following is NOT a mistake that
investigators commonly make? - Answer-Use of correct cables and cabling techniques.

,\.Because they are always changing, the information in the registers or the processor cache are
the most volatile data. - Answer-True.



\.Codes of ethics are the principles stated to describe the expected behavior of an investigator
while handling a case. Which of the following is NOT a principle that a computer forensic
investigator must follow? - Answer-Provide personal or prejudiced opinions.



\.Computer Forensics deals with the process of finding _____ related to a digital crime to find
the culprits and initiate legal action against them. - Answer-Evidence.



\.Courts call knowledgable persons to testify to the accuracy of the investigative process. These
people who tesify are known as the: - Answer-Expert witnesses.



\.Cybercrimes can be classified into the following two types of attacks, based on the line of
attack. - Answer-Internal and External.



\.Digital devices store data about session such as user and type of connection. - Answer-True.



\.Espionage, theft of intellectual property, manipulation of records, and trojan horse attacks are
examples of what? - Answer-Insider attack or primary attacks.



\.External attacks occur when there are inadequate information-security policies and
procedures. - Answer-True.



\.For Forensics Analysis, which of the following MySQL Utility Programs is used to export
metadata, data, or both from one or more databases? - Answer-mysqldbexport



\.Forensic data duplication involves the creation of a file that has every bit of information from
the source in a raw bit-stream format. - Answer-True.

, \.Forensic readiness includes technical and nontechnical actions that maximize an organization's
competence to use digital evidence. - Answer-True.



\.Forensic readiness refers to: - Answer-An organization's ability to make optimal use of digital
evidence in a limited time period and with minimal investigation costs.



\.How can an attacker exploit a network? - Answer-Through wired or wireless connections.



\.How large is the partition table structure that stores information about the partitions present
on the hard disk? - Answer-64-byte.



\.How many bit values does HFS use to address allocation blocks? - Answer-16



\.How many bits are used by the MBR partition scheme for storing LBAs (Logical Block
Addresses) and the size information on a 512-byte sector? - Answer-32 bits



\.How should expert witnesses conduct themselves while presenting testimony to any court or
attorney? - Answer-Avoid leaning and develop self-confidence.



\.Identify the following Cloud computing services that enable subscribers to use fundamental IT
resources such as computing power, virtualization, data storage, network, and so on- on
demand. - Answer-Infrastructure-as-a-service (IaaS)



\.Identify the following which was launched by the National Institute of Standards and
Technology (NIST), that establishes a "methodology for testing computer forensics software
tools by development of general tool specifications, test procedures, test criteria, test sets, and
test hardware." - Answer-Computer Forensic Tool Testing Project (CFTTP)
$13.49
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
IszackBd

Also available in package deal

Thumbnail
Package deal
WGU EXAMS BUNDLE
-
17 2025
$ 193.73 More info

Get to know the seller

Seller avatar
IszackBd University Of Washington
View profile
Follow You need to be logged in order to follow users or courses
Sold
1
Member since
1 year
Number of followers
0
Documents
1722
Last sold
1 month ago
IszackBd Stuvia

Our store offers a wide selection of materials on various subjects and difficulty levels, created by experienced teachers. We specialize on NURSING,WGU,ACLS USMLE,TNCC,PMHNP,ATI and other major courses, Updated Exam, Study Guides and Test banks. If you don't find any document you are looking for in this store contact us and we will fetch it for you in minutes, we love impressing our clients with our quality work and we are very punctual on deadlines. Please go through the sets description appropriately before any purchase and leave a review after purchasing so as to make sure our customers are 100% satisfied. FOR ANY REQUEST FEEL FREE TO REACH US

Read more Read less
0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions