b b b
Digital Forensics in Cybersecurity 2022
b b b b b b
Solved 100% b b
Thebchiefbinformationbofficerbofbanbaccountingbfirmbbelievesbsensitivebdatabisbbeingbexp
osedbonbtheblocalbnetwork.bWhichbtoolbshouldbthebITbstaffbusebtobgatherbdigitalbevidence
baboutbthisbsecuritybvulnerability?
AbSniffer
BbDiskbanalyzer
CbTracer
DbVirusbscannerb-bA
Abpolicebdetectivebinvestigatingbabthreatbtracesbthebsourcebtobabhouse.bThebcouplebatbth
ebhousebshowsbthebdetectivebthebonlybcomputerbthebfamilybowns,bwhichbisbinbtheirbson'sb
bedroom.bThebcouplebstatesbthatbtheirbsonbisbpresentlybinbclassbatbablocalbmiddlebschool
.
Howbshouldbthebdetectiveblegallybgainbaccessbtobthebcomputer?
AbObtainbabsearchbwarrantbfrombthebpolice
BbSeizebthebcomputerbunderbthebUSAbPatriotbAct
CbObtainbconsentbtobsearchbfrombthebparents
DbSeizebthebcomputerbunderbthebComputerbSecuritybActb-bC
HowbshouldbabforensicbscientistbobtainbthebnetworkbconfigurationbfrombabWindowsbPCbb
eforebseizingbitbfrombabcrimebscene?
AbBybusingbthebipconfigbcommandbfrombabcommandbpromptbonbthebcomputer
BbBybusingbthebtracertbcommandbfrombabcommandbpromptbonbthebcomputer
CbBybloggingbintobthebrouterbtobwhichbthebPCbisbconnected
DbBybinstallingbabnetworkbpacketbsnifferbonbthebcomputerb-bA
Thebhumanbresourcesbmanagerbofbabsmallbaccountingbfirmbbelievesbhebmaybhavebbeen
babvictimbofbabphishingbscam.bThebmanagerbclickedbonbablinkbinbanbemailbmessagebthatba
skedbhimbtobverifybtheblogonbcredentialsbforbthebfirm'sbonlinebbankbaccount.
Whichbdigitalbevidencebshouldbabforensicbinvestigatorbcollectbtobinvestigatebthisbincident
?
AbSystemblog
BbSecurityblog
CbDiskbcache
DbBrowserbcacheb-bD
Afterbabcompany'sbsingle-
purpose,bdedicatedbmessagingbserverbisbhackedbbybabcybercriminal,babforensicsbexpert
bisbhiredbtobinvestigatebthebcrimebandbcollectbevidence.
Whichbdigitalbevidencebshouldbbebcollected?
,WGU Course C840 -
b b b
Digital Forensics in Cybersecurity 2022
b b b b b b
Solved 100% b b
AbWebbserverblogs
BbFirewallblogs
CbPhishingbemails
DbSpambmessagesb-bB
Thomasbreceivedbanbemailbstatingbthatbhebneededbtobfollowbablinkbandbverifybhisbbankba
ccountbinformationbtobensurebitbwasbsecure.bShortlybafterbfollowingbthebinstructions,bTho
masbnoticedbmoneybwasbmissingbfrombhisbaccount.
WhichbdigitalbevidencebshouldbbebconsideredbtobdeterminebhowbThomas'baccountbinfor
mationbwasbcompromised?
AbSocialbmediabaccounts
BbRouterblogs
CbFlashbdrivebcontents
DbEmailbmessagesb-bD
Thebchiefbexecutivebofficerb(CEO)bofbabsmallbcomputerbcompanybhasbidentifiedbabpotent
ialbhackingbattackbfrombanboutsidebcompetitor.b
Whichbtypebofbevidencebshouldbabforensicsbinvestigatorbusebtobidentifybthebsourcebofbthe
bhack?
AbDiskbdrivebbackups
BbNetworkbtransactionblogs
CbBrowserbhistory
DbEmailbheadersb-bB
Abforensicbscientistbarrivesbatbabcrimebscenebtobbeginbcollectingbevidence.
Whatbisbthebfirstbthingbthebforensicbscientistbshouldbdo?
AbTurnboffbthebpowerbtobthebentirebareabbeingbexamined
BbUnplugballbnetworkbconnectionsbsobdatabcannotbbebdeletedbremotely
CbGatherbupballbphysicalbevidencebandbmovebitboutbasbquicklybasbpossible
DbPhotographballbevidencebinbitsboriginalbplaceb-bD
Whichbmethodbofbcopyingbdigitalbevidencebensuresbproperbevidencebcollection?
AbMakebthebcopybusingbfilebtransfer
BbCopybfilesbusingbdragbandbdrop
CbMakebthebcopybatbthebbit-level
DbCopybtheblogicalbpartitionsb-bC
,WGU Course C840 -
b b b
Digital Forensics in Cybersecurity 2022
b b b b b b
Solved 100% b b
Abcomputerbinvolvedbinbabcrimebisbinfectedbwithbmalware.bThebcomputerbisbonbandbconn
ectedbtobthebcompany'sbnetwork.bThebforensicbinvestigatorbarrivesbatbthebscene.
Whichbactionbshouldbbebthebinvestigator'sbfirstbstep?
AbRemovebthebmalwarebandbsecurebthebcomputer.
BbUnplugbthebcomputer'sbpowerbcord.
CbUnplugbthebcomputer'sbEthernetbcable.
DbLabelballbthebattachmentsbandbsecurebthebcomputer.b-bC
Whatbarebthebthreebbasicbtasksbthatbabsystemsbforensicbspecialistbmustbkeepbinbmindbw
henbhandlingbevidencebduringbabcybercrimebinvestigation?
Answerboptionsbmaybbebusedbmorebthanbonceborbnotbatball.bSelectbyourbanswersbfrombth
ebpull-downblist.
1bPreservebevidence
2bCatalogbevidence
3bPreparebevidence
4bMakebmultiplebcopiesbofbevidence
5bDisseminatebevidence
6bPreparebevidencebreport
7bFindbevidence
Ab1,3,7
Bb2,3,7b-bA
Howbdobforensicbspecialistsbshowbthatbdigitalbevidencebwasbhandledbinbabprotected,bsec
urebmannerbduringbthebprocessbofbcollectingbandbanalyzingbthebevidence?
AbForensicblabblogbooks
BbForensicbsoftwareblogs
CbChainbofbcustody
DbChainbofbemailbmessagesb-bC
Whichbcharacteristicbappliesbtobmagneticbdrivesbcomparedbtobsolid-
statebdrivesb(SSDs)?
AbLowerbcapacity
BbBetterbdurability
CbLowerbpowerbconsumption
DbLowerbcostb-bD
Whichbcharacteristicbappliesbtobsolid-
statebdrivesb(SSDs)bcomparedbtobmagneticbdrives?
, WGU Course C840 -
b b b
Digital Forensics in Cybersecurity 2022
b b b b b b
Solved 100% b b
AbTheybhavebslowerbstart-upbtimes.
BbTheybcostbless.
CbTheybareblessbsusceptiblebtobdamage.
DbTheybusebmorebpower.b-bC
Whichbtypebofbstoragebformatbshouldbbebtransportedbinbabspecialbbagbtobreducebelectros
taticbinterference?
AbSolid-statebdrives
BbMagneticbmedia
CbDigitalbaudiobtapes
DbOpticalbmediab-bB
WhichbWindowsbcomponentbisbresponsiblebforbreadingbthebboot.inibfilebandbdisplayingbt
hebbootbloaderbmenubonbWindowsbXPbduringbthebbootbprocess?
AbWin32bsubsystem
BbNTLDR
CbNTOSKRNL
DbWindowsbRegistryb-bB
Thebfollowingblinebofbcodebisbanbexamplebofbhowbtobmakebabforensicbcopybofbabsuspectbd
rive:ddbif=/dev/membof=/evidence/image.memory1
Whichboperatingbsystembshouldbbebusedbtobrunbthisbcommand?
AbChrome
BbBlackBerry
CbWindows
DbLinuxb-bD
WhichbfilebsystembisbsupportedbbybMac?
AbHierarchicalbFilebSystembPlusb(HFS+)
BbExtendedbFilebSystemb(Ext)
CbBerkeleybFastbFilebSystemb(FFS)
DbReiserbFilebSystemb(ReiserFS)b-bA
Whichblawbrequiresbbothbpartiesbtobconsentbtobthebrecordingbofbabconversation?
AbHealthbInsurancebPortabilitybandbAccountabilitybActb(HIPAA)
BbUSAbPatriotbAct
CbCommunicationsbAssistancebtobLawbEnforcementbActb(CALEA)
DbElectronicbCommunicationsbPrivacybActb(ECPA)b-bD