12/14/25, 6:07 PM WGU Course C840 - Digital Forensics in Cybersecurity Quizlet by Brian MacFarlane Flashcards | Quizlet
WGU Course C840 - Digital Forensics in
Cybersecurity Quizlet by Brian MacFarlane with
100%correct answer
Terms in this set (272)
The chief information A
officer of an accounting
firm believes sensitive
data is being exposed on
the local network. Which
tool should the IT staff use
to gather digital evidence
about this security
vulnerability?
A Sniffer
B Disk analyzer
C Tracer
D Virus scanner
https://quizlet.com/470011081/wgu-course-c840-digital-forensics-in-cybersecurity-quizlet-by-brian-macfarlane-flash-cards/ 1/168
,12/14/25, 6:07 PM WGU Course C840 - Digital Forensics in Cybersecurity Quizlet by Brian MacFarlane Flashcards | Quizlet
A police detective C
investigating a threat
traces the source to a
house. The couple at the
house shows the detective
the only computer the
family owns, which is in
their son's bedroom. The
couple states that their
son is presently in class at
a local middle school.
How should the detective
legally gain access to the
computer?
A Obtain a search warrant
from the police
B Seize the computer
under the USA Patriot Act
C Obtain consent to
search from the parents
D Seize the computer
under the Computer
Security Act
https://quizlet.com/470011081/wgu-course-c840-digital-forensics-in-cybersecurity-quizlet-by-brian-macfarlane-flash-cards/ 2/168
,12/14/25, 6:07 PM WGU Course C840 - Digital Forensics in Cybersecurity Quizlet by Brian MacFarlane Flashcards | Quizlet
How should a forensic A
scientist obtain the
network configuration
from a Windows PC
before seizing it from a
crime scene?
A By using the ipconfig
command from a
command prompt on the
computer
B By using the tracert
command from a
command prompt on the
computer
C By logging into the
router to which the PC is
connected
D By installing a network
packet sniffer on the
computer
https://quizlet.com/470011081/wgu-course-c840-digital-forensics-in-cybersecurity-quizlet-by-brian-macfarlane-flash-cards/ 3/168
, 12/14/25, 6:07 PM WGU Course C840 - Digital Forensics in Cybersecurity Quizlet by Brian MacFarlane Flashcards | Quizlet
The human resources D
manager of a small
accounting firm believes
he may have been a victim
of a phishing scam. The
manager clicked on a link
in an email message that
asked him to verify the
logon credentials for the
firm's online bank account.
Which digital evidence
should a forensic
investigator collect to
investigate this incident?
A System log
B Security log
C Disk cache
D Browser cache
After a company's single- B
purpose, dedicated
messaging server is
hacked by a cybercriminal,
a forensics expert is hired
to investigate the crime
and collect evidence.
Which digital evidence
should be collected?
A Web server logs
B Firewall logs
C Phishing emails
D Spam messages
https://quizlet.com/470011081/wgu-course-c840-digital-forensics-in-cybersecurity-quizlet-by-brian-macfarlane-flash-cards/ 4/168
WGU Course C840 - Digital Forensics in
Cybersecurity Quizlet by Brian MacFarlane with
100%correct answer
Terms in this set (272)
The chief information A
officer of an accounting
firm believes sensitive
data is being exposed on
the local network. Which
tool should the IT staff use
to gather digital evidence
about this security
vulnerability?
A Sniffer
B Disk analyzer
C Tracer
D Virus scanner
https://quizlet.com/470011081/wgu-course-c840-digital-forensics-in-cybersecurity-quizlet-by-brian-macfarlane-flash-cards/ 1/168
,12/14/25, 6:07 PM WGU Course C840 - Digital Forensics in Cybersecurity Quizlet by Brian MacFarlane Flashcards | Quizlet
A police detective C
investigating a threat
traces the source to a
house. The couple at the
house shows the detective
the only computer the
family owns, which is in
their son's bedroom. The
couple states that their
son is presently in class at
a local middle school.
How should the detective
legally gain access to the
computer?
A Obtain a search warrant
from the police
B Seize the computer
under the USA Patriot Act
C Obtain consent to
search from the parents
D Seize the computer
under the Computer
Security Act
https://quizlet.com/470011081/wgu-course-c840-digital-forensics-in-cybersecurity-quizlet-by-brian-macfarlane-flash-cards/ 2/168
,12/14/25, 6:07 PM WGU Course C840 - Digital Forensics in Cybersecurity Quizlet by Brian MacFarlane Flashcards | Quizlet
How should a forensic A
scientist obtain the
network configuration
from a Windows PC
before seizing it from a
crime scene?
A By using the ipconfig
command from a
command prompt on the
computer
B By using the tracert
command from a
command prompt on the
computer
C By logging into the
router to which the PC is
connected
D By installing a network
packet sniffer on the
computer
https://quizlet.com/470011081/wgu-course-c840-digital-forensics-in-cybersecurity-quizlet-by-brian-macfarlane-flash-cards/ 3/168
, 12/14/25, 6:07 PM WGU Course C840 - Digital Forensics in Cybersecurity Quizlet by Brian MacFarlane Flashcards | Quizlet
The human resources D
manager of a small
accounting firm believes
he may have been a victim
of a phishing scam. The
manager clicked on a link
in an email message that
asked him to verify the
logon credentials for the
firm's online bank account.
Which digital evidence
should a forensic
investigator collect to
investigate this incident?
A System log
B Security log
C Disk cache
D Browser cache
After a company's single- B
purpose, dedicated
messaging server is
hacked by a cybercriminal,
a forensics expert is hired
to investigate the crime
and collect evidence.
Which digital evidence
should be collected?
A Web server logs
B Firewall logs
C Phishing emails
D Spam messages
https://quizlet.com/470011081/wgu-course-c840-digital-forensics-in-cybersecurity-quizlet-by-brian-macfarlane-flash-cards/ 4/168