WGU D431 TASK 2 | DIGITAL FORENSICS IN CYBERSECURITY |
LATEST UPDATE 100% CORRECT answers
Which law requires both parties to consent to the recording of a conversation? - -Electronic
Communications Privacy Act (ECPA)
--Which law is related to the disclosure of personally identifiable protected health
information (PHI)? - -Health Insurance Portability and Accountability Act (HIPAA)
--Which U.S. law criminalizes the act of knowingly using a misleading domain name with the
intent to deceive a minor into viewing harmful material? - -18 U.S.C. 2252B
--Which U.S. law protects journalists from turning over their work or sources to law
enforcement before the information is shared with the public? - -The Privacy Protection Act
(PPA)
--Which law or guideline lists the four states a mobile device can be in when data is
extracted from it? - -NIST SP 800-72 Guidelines
--Which law includes a provision permitting the wiretapping of VoIP calls? - -
Communications Assistance to Law Enforcement Act (CALEA
--Which policy is included in the CAN-SPAM Act? - -The email sender must provide some
mechanism whereby the receiver can opt out of future emails and that method cannot
require the receiver to pay in order to opt out.
--Which United States law requires telecommunications equipment manufacturers to
provide built-in surveillance capabilities for federal agencies? - -Communication Assistance
to Law Enforcement Act (CALEA)
--Which law requires a search warrant or one of the recognized exceptions to the search
warrant requirements for searching email messages on a computer? - -The Fourth
Amendment to the U.S. Constitution
--During a cyber-forensics investigation, a USB drive was found that contained multiple
pictures of the same flower.
How should an investigator use properties of a file to detect steganography? - -Review the
hexadecimal code looking for anomalies in the file headers and endings using a tool such as
EnCase
--A system administrator believes data are being leaked from the organization. The
administrator decides to use steganography to hide tracking information in the types of files
he thinks are being leaked.
LATEST UPDATE 100% CORRECT answers
Which law requires both parties to consent to the recording of a conversation? - -Electronic
Communications Privacy Act (ECPA)
--Which law is related to the disclosure of personally identifiable protected health
information (PHI)? - -Health Insurance Portability and Accountability Act (HIPAA)
--Which U.S. law criminalizes the act of knowingly using a misleading domain name with the
intent to deceive a minor into viewing harmful material? - -18 U.S.C. 2252B
--Which U.S. law protects journalists from turning over their work or sources to law
enforcement before the information is shared with the public? - -The Privacy Protection Act
(PPA)
--Which law or guideline lists the four states a mobile device can be in when data is
extracted from it? - -NIST SP 800-72 Guidelines
--Which law includes a provision permitting the wiretapping of VoIP calls? - -
Communications Assistance to Law Enforcement Act (CALEA
--Which policy is included in the CAN-SPAM Act? - -The email sender must provide some
mechanism whereby the receiver can opt out of future emails and that method cannot
require the receiver to pay in order to opt out.
--Which United States law requires telecommunications equipment manufacturers to
provide built-in surveillance capabilities for federal agencies? - -Communication Assistance
to Law Enforcement Act (CALEA)
--Which law requires a search warrant or one of the recognized exceptions to the search
warrant requirements for searching email messages on a computer? - -The Fourth
Amendment to the U.S. Constitution
--During a cyber-forensics investigation, a USB drive was found that contained multiple
pictures of the same flower.
How should an investigator use properties of a file to detect steganography? - -Review the
hexadecimal code looking for anomalies in the file headers and endings using a tool such as
EnCase
--A system administrator believes data are being leaked from the organization. The
administrator decides to use steganography to hide tracking information in the types of files
he thinks are being leaked.