100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU C702 Exam Study Questions with Detailed Answers 2026

Rating
-
Sold
-
Pages
12
Grade
A
Uploaded on
22-12-2025
Written in
2025/2026

Quantitative Risk Analysis - 2 Computer Forensics A set of methodological procedures and techniques that help identify, gather, preserve, extract, interpret, document, and present evidence from computers in a way that is legally admissible 3 Cyber Crime Any illegal act involving a computing device, network, its systems, or its applications. Both internal and external 4 Enterprise Theory of Investigation (ETI) Methodology for investigating criminal activity 5 Types of Cyber Crime Civil, Criminal, Administrative 6 Civil Cases Involve disputes between two parties. Brought for violation of contracts and lawsuits where a guilty outcome generally results in monetary damages to the plaintiff 7 Criminal Cases Brought by law enforcement agencies in response to a suspected violation of law where a guilty outcome results in monetary damages, imprisonment, or both 8 Administrative Cases An internal investigation by an organization to discover if its employees/clients/partners are abiding by the rules or policies (Violation of company policies). Non-criminal in nature and are related to misconduct or activities of an employee 9 Rules of Forensic Investigation Safeguard the integrity of the evidence and render it acceptable in a court of law. The forensic examiner must make duplicate copies of the original evidence. The duplicate copies must be accurate replications of the originals, and the forensic examiner must also authenticate the duplicate copies to avoid questions about the integrity of the evidence. Must not continue with the investigation if the examination is going to be beyond his or her knowledge level or skill level. 10 Cyber Crime Investigation Methodology/Steps 1.Identify the computer crime 2.Collect preliminary evidence 3.Obtain court warrant dor discovery/seizure of evidence 4.Perform first responder procedures 5.Seize evidence at the crime scene 6. Transport evidence to lab 7.Create two bitstream copies of the evidence 8. Generate MD5 checksum of the s 9. Maintain chain of custody 10. Store original evidence in secure location 11. Analyze the copy for evidence 12. Prepare a forensic report 13. Submit a report to client 14. Testify in course as an expert witness 11 Locard's Exchange Principle Anyone of anything, entering a crime scene takes something of the scene with them and leaves something of themselves behind when they leave. 12 Types of Digital Data Volatile Data Non-volatile Data 13 Volatile Data Temporary information on a device that requires a constant power supply and is deleted if the power supply is interrupted 14 Non-Volatile Data Secondary storage of data. Long-term, persistent data. Permanent data stored on secondary storage devices, such as hard disks and memory cards. 15 Characteristics of Digital Evidence 1. Be Relevant 2. Be probative 3. Be authentic 4. Be accurate 5. Be complete 6. Be convincing 7. Be admissible

Show more Read less









Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
December 22, 2025
Number of pages
12
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU C702



WGU C702 Exam Study Questions
with Detailed Answers 2026
Quantitative Risk Analysis
-

2
Computer Forensics
A set of methodological procedures and techniques that help identify, gather, preserve,
extract, interpret, document, and present evidence from computers in a way that is legally
admissible

3
Cyber Crime
Any illegal act involving a computing device, network, its systems, or its applications. Both
internal and external

4
Enterprise Theory of Investigation (ETI)
Methodology for investigating criminal activity

5
Types of Cyber Crime
Civil, Criminal, Administrative

6
Civil Cases
Involve disputes between two parties. Brought for violation of contracts and lawsuits where
a guilty outcome generally results in monetary damages to the plaintiff

7
Criminal Cases
Brought by law enforcement agencies in response to a suspected violation of law where a
guilty outcome results in monetary damages, imprisonment, or both

8
Administrative Cases
An internal investigation by an organization to discover if its employees/clients/partners
are abiding by the rules or policies (Violation of company policies). Non-criminal in nature
and are related to misconduct or activities of an employee

9
Rules of Forensic Investigation




WGU C702

, WGU C702


Safeguard the integrity of the evidence and render it acceptable in a court of law. The
forensic examiner must make duplicate copies of the original evidence. The duplicate
copies must be accurate replications of the originals, and the forensic examiner must also
authenticate the duplicate copies to avoid questions about the integrity of the evidence.
Must not continue with the investigation if the examination is going to be beyond his or her
knowledge level or skill level.

10
Cyber Crime Investigation Methodology/Steps
1.Identify the computer crime 2.Collect preliminary evidence 3.Obtain court warrant dor
discovery/seizure of evidence 4.Perform first responder procedures 5.Seize evidence at the
crime scene 6. Transport evidence to lab 7.Create two bitstream copies of the evidence 8.
Generate MD5 checksum of the s 9. Maintain chain of custody 10. Store original evidence
in secure location 11. Analyze the copy for evidence 12. Prepare a forensic report 13.
Submit a report to client 14. Testify in course as an expert witness

11
Locard's Exchange Principle
Anyone of anything, entering a crime scene takes something of the scene with them and
leaves something of themselves behind when they leave.

12
Types of Digital Data
Volatile Data
Non-volatile Data

13
Volatile Data
Temporary information on a device that requires a constant power supply and is
deleted if the power supply is interrupted

14
Non-Volatile Data
Secondary storage of data. Long-term, persistent data.
Permanent data stored on secondary storage devices, such as hard disks and memory
cards.

15
Characteristics of Digital Evidence
1. Be Relevant
2. Be probative
3. Be authentic
4. Be accurate
5. Be complete
6. Be convincing
7. Be admissible



WGU C702

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
PossibleA Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
992
Member since
4 year
Number of followers
650
Documents
12800
Last sold
15 hours ago
POSSIBLEA QUALITY UPDATED EXAMS

Choose quality study materials for nursing schools to ensure success in your studies and future career. "Welcome to PossibleA - your perfect study assistant! Here you will find Quality sheets, study materials, exams, quizzes, tests, and notes to prepare for exams and study successfully. Our store offers a wide selection of materials on various subjects and difficulty levels, created by experienced teachers and checked for quality. Our quality sheets are an easy and quick way to remember key points and definitions. And our study materials, tests, and quizzes will help you absorb the material and prepare for exams. Our store also has notes and lecture summaries that will help you save time and make the learning process more efficient.

Read more Read less
3.9

143 reviews

5
74
4
25
3
21
2
1
1
22

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions