CourseC702-
Forensicsand
Network
Intrusion
,WGU C702 – Forensics and Network Intrusion |
Master’s Course Study Material with Complete
Coverage.
ALsoftwareLcompanyLsuspectsLthatLemployeesLhaveLsetLupLautomaticLcorporateLemail Lfor
wardingLtoLtheirLpersonalLinboxesLagainstLcompanyLpolicy.LTheLcompanyLhires LforensicLi
nvestigatorsLtoLidentifyLtheLemployeesLviolatingLpolicy,LwithLtheLintentionLof LissuingLwarni
ngsLtoLthem.
WhichLtypeLofLcybercrimeLinvestigationLapproachLisLthisLcompanyLtaking?
ALCivil
BLCriminal
CLAdministrative
DLPunitiveL-CORRECTLANSWER C
WhichLmodelLorLlegislationLappliesLaLholisticLapproachLtowardLanyLcriminalLactivityLasLa Lcri
minalLoperation?
ALEnterpriseLTheoryLofLInvestigation
BLRacketeerLInfluencedLandLCorruptLOrganizationsLAct
CLEvidenceLExamination
DLLawLEnforcementLCyberLIncidentLReportingL-CORRECTLANSWER A
WhatLdoesLaLforensicLinvestigatorLneedLtoLobtainLbeforeLseizingLaLcomputingLdeviceLinLa cr
iminalLcase?
ALCourtLwarrant
BLCompletedLcrimeLreport
CLChainLofLcustodyLdocument
DLPlaintiff'sLpermissionL-CORRECTLANSWER A
WhichLactivityLshouldLbeLusedLtoLcheckLwhetherLanLapplicationLhasLeverLbeenLinstalled Lon
LaLcomputer?
,ALPenetrationLtest
BLRiskLanalysis
CLLogLreview
DLSecurityLreviewL-CORRECTLANSWER C
WhichLcharacteristic
L describes
L anL organization's
L forensic
L readiness
L inL theL context
L ofL cybercrimes?
A LItLincludesL moralLconsiderations.
BLItLincludesLcostLconsiderations.
C LItLexcludesLnontechnicalL actions.
, DLItLexcludesLtechnicalLactions.L-CORRECTLANSWER B
ALcybercrimeLinvestigatorLidentifiesLaLUniversalLSerialLBusL(USB)LmemoryLstick containin
gLemailsLasLaLprimaryLpieceLofLevidence.
WhoLmustLsignLtheLchainLofLcustodyLdocumentLonceLtheLUSBLstickLisLinLevidence?
ALThoseLwhoLobtainLaccessLtoLtheLdevice
BLAnyoneLwhoLhasLeverLusedLtheLdevice
CLRecipientsLofLemailsLonLtheLdevice
DLAuthorsLofLemailsLonLtheLdeviceL-CORRECTLANSWER A
WhichLtypeLofLattackLisLaLdenial-of-
serviceLtechniqueLthatLsendsLaLlargeLamountLofLdata LtoLoverwhelmLsystemLresources?
ALPhishing
BLSpamming
CLMailLbombing
DLBluejackingL-CORRECTLANSWER C
WhichLcomputerLcrimeLforensicsLstepLrequiresLanLinvestigatorLtoLduplicateLandLimage the
LcollectedLdigitalLinformation?
ALSecuringLevidence
BLAcquiringLdata
CLAnalyzingLdata
DLAssessingLevidenceL-CORRECTLANSWER B
WhatLisLtheLlastLstepLofLaLcriminalLinvestigationLthatLrequiresLtheLinvolvementLofLa compute
rLforensicLinvestigator?
ALAnalyzingLtheLdataLcollected
BLTestifyingLinLcourt
CLAssessingLtheLevidence
DLPerformingLsearchLandLseizureL-CORRECTLANSWER B
HowLcanLaLforensicLinvestigatorLverifyLanLAndroidLmobileLdeviceLisLon,LwithoutLpotentially c
hangingLtheLoriginalLevidenceLorLinteractingLwithLtheLoperatingLsystem?