100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU C702 OA CERTIFICATION EVALUATION EXAMS SET LATEST VERSION

Rating
-
Sold
-
Pages
32
Grade
A+
Uploaded on
23-11-2025
Written in
2025/2026

WGU C702 OA CERTIFICATION EVALUATION EXAMS SET LATEST VERSION

Institution
WGU C702 OA
Course
WGU C702 OA











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU C702 OA
Course
WGU C702 OA

Document information

Uploaded on
November 23, 2025
Number of pages
32
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU C702 OA CERTIFICATION EVALUATION
EXAMS SET LATEST VERSION


⩥ Which of the following is NOT a objective of computer forensics?.
Answer: Document vulnerabilities allowing further loss of intellectual
property, finances, and reputation during an attack.


⩥ Which of the following is true regarding Enterprise Theory of
Investigation (ETI)?. Answer: It adopts a holistic approach toward any
criminal activity as a criminal operation rather as a single criminal act.


⩥ Forensic readiness refers to:. Answer: An organization's ability to
make optimal use of digital evidence in a limited time period and with
minimal investigation costs.


⩥ Which of the following is NOT a element of cybercrime?. Answer:
Evidence smaller in size.


⩥ Which of the following is true of cybercrimes?. Answer: Investigators,
with a warrant, have the authority to forcibly seize the computing
devices.


⩥ Which of the following is true of cybercrimes?. Answer: The initial
reporting of the evidence is usually informal.

,⩥ Which of the following is NOT a consideration during a cybercrime
investigation?. Answer: Value or cost to the victim.


⩥ Which of the following is a user-created source of potential evidence?.
Answer: Address book.


⩥ Which of the following is a computer-created source of potential
evidence?. Answer: Swap file.


⩥ Which of the following is NOT where potential evidence may be
located?. Answer: Processor.


⩥ Under which of the following conditions will duplicate evidence NOT
suffice?. Answer: When original evidence is in possession of the
originator.


⩥ Which of the following Federal Rules of Evidence governs
proceedings in the courts of the United States?. Answer: Rule 101.


⩥ Which of the following Federal Rules of Evidence ensures that the
truth may be ascertained and the proceedings justly determined?.
Answer: Rule 102.


⩥ Which of the following Federal Rules of Evidence contains rulings on
evidence?. Answer: Rule 103

,⩥ Which of the following Federal Rules of Evidence states that the court
shall restrict the evidence to its proper scope and instruct the jury
accordingly?. Answer: Rule 105


⩥ Which of the following refers to a set of methodological procedures
and techniques to identify, gather, preserve, extract, interpret, document,
and present evidence from computing equipment in such a manner that
the discovered evidence is acceptable during a legal and/or
administrative proceeding in a court of law?. Answer: Computer
Forensics.


⩥ Computer Forensics deals with the process of finding _____ related to
a digital crime to find the culprits and initiate legal action against them..
Answer: Evidence.


⩥ Minimizing the tangible and intangible losses to the organization or an
individual is considered an essential computer forensics use.. Answer:
True.


⩥ Cybercrimes can be classified into the following two types of attacks,
based on the line of attack.. Answer: Internal and External.


⩥ Espionage, theft of intellectual property, manipulation of records, and
trojan horse attacks are examples of what?. Answer: Insider attack or
primary attacks.

, ⩥ External attacks occur when there are inadequate information-security
policies and procedures.. Answer: True.


⩥ Which type of cases involve disputes between two parties?. Answer:
Civil.


⩥ A computer forensic examiner can investigate any crime as long as he
or she takes detailed notes and follows the appropriate processes..
Answer: False.


⩥ ________ is the standard investigative model used by the FBI when
conducting investigations against major criminal organizations.. Answer:
Enterprise Theory of Investigation (ETI).


⩥ Forensic readiness includes technical and nontechnical actions that
maximize an organization's competence to use digital evidence..
Answer: True.


⩥ Which of the following is the process of developing a strategy to
address the occurrence of any security breach in the system or network?.
Answer: Incident Response.


⩥ Digital devices store data about session such as user and type of
connection.. Answer: True.
$11.99
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
TopGradeInsider

Get to know the seller

Seller avatar
TopGradeInsider Harvard University
View profile
Follow You need to be logged in order to follow users or courses
Sold
7
Member since
10 months
Number of followers
0
Documents
3890
Last sold
1 week ago
TopGradeInsider

Welcome to TopGradeInsider, your ultimate partner in navigating academic life. We know the pressure you’re under, which is why we’ve curated a massive library of high-quality resources designed to make your life easier. Access reliable test banks, solution manuals, and study guides that clarify complex topics and save you valuable time. Don’t let stress get in the way of your degree let TopGradeInsider give you the support you need to finish strong.

Read more Read less
0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions