WGU Course C840 -
G G G
Digital Forensics in Cybersecurity 2022
G G G G G G
Solved 100% G G
TheGchiefGinformationGofficerGofGanGaccountingGfirmGbelievesGsensitiveGdataGisGbeingGe
xposedGonGtheGlocalGnetwork.GWhichGtoolGshouldGtheGITGstaffGuseGtoGgatherGdigitalGevi
denceGaboutGthisGsecurityGvulnerability?
AGSniffer
BGDiskGanalyzer
CGTracer
DGVirusGscannerG-GA
AGpoliceGdetectiveGinvestigatingGaGthreatGtracesGtheGsourceGtoGaGhouse.GTheGcoupleGat
GtheGhouseGshowsGtheGdetectiveGtheGonlyGcomputerGtheGfamilyGowns,GwhichGisGinGtheirG
son'sGbedroom.GTheGcoupleGstatesGthatGtheirGsonGisGpresentlyGinGclassGatGaGlocalGmidd
leGschool.
HowGshouldGtheGdetectiveGlegallyGgainGaccessGtoGtheGcomputer?
AGObtainGaGsearchGwarrantGfromGtheGpolice
BGSeizeGtheGcomputerGunderGtheGUSAGPatriotGAct
CGObtainGconsentGtoGsearchGfromGtheGparents
DGSeizeGtheGcomputerGunderGtheGComputerGSecurityGActG-GC
HowGshouldGaGforensicGscientistGobtainGtheGnetworkGconfigurationGfromGaGWindowsGP
CGbeforeGseizingGitGfromGaGcrimeGscene?
AGByGusingGtheGipconfigGcommandGfromGaGcommandGpromptGonGtheGcomputer
BGByGusingGtheGtracertGcommandGfromGaGcommandGpromptGonGtheGcomputer
CGByGloggingGintoGtheGrouterGtoGwhichGtheGPCGisGconnected
DGByGinstallingGaGnetworkGpacketGsnifferGonGtheGcomputerG-GA
TheGhumanGresourcesGmanagerGofGaGsmallGaccountingGfirmGbelievesGheGmayGhaveGbe
enGaGvictimGofGaGphishingGscam.GTheGmanagerGclickedGonGaGlinkGinGanGemailGmessage
GthatGaskedGhimGtoGverifyGtheGlogonGcredentialsGforGtheGfirm'sGonlineGbankGaccount.
WhichGdigitalGevidenceGshouldGaGforensicGinvestigatorGcollectGtoGinvestigateGthisGincid
ent?
AGSystemGlog
BGSecurityGlog
CGDiskGcache
DGBrowserGcacheG-GD
AfterGaGcompany'sGsingle-
purpose,GdedicatedGmessagingGserverGisGhackedGbyGaGcybercriminal,GaGforensicsGexp
ertGisGhiredGtoGinvestigateGtheGcrimeGandGcollectGevidence.
WhichGdigitalGevidenceGshouldGbeGcollected?
,WGU Course C840 -
G G G
Digital Forensics in Cybersecurity 2022
G G G G G G
Solved 100% G G
AGWebGserverGlogs
BGFirewallGlogs
CGPhishingGemails
DGSpamGmessagesG-GB
ThomasGreceivedGanGemailGstatingGthatGheGneededGtoGfollowGaGlinkGandGverifyGhisGban
kGaccountGinformationGtoGensureGitGwasGsecure.GShortlyGafterGfollowingGtheGinstruction
s,GThomasGnoticedGmoneyGwasGmissingGfromGhisGaccount.
WhichGdigitalGevidenceGshouldGbeGconsideredGtoGdetermineGhowGThomas'GaccountGinf
ormationGwasGcompromised?
AGSocialGmediaGaccounts
BGRouterGlogs
CGFlashGdriveGcontents
DGEmailGmessagesG-GD
TheGchiefGexecutiveGofficerG(CEO)GofGaGsmallGcomputerGcompanyGhasGidentifiedGaGpot
entialGhackingGattackGfromGanGoutsideGcompetitor.G
WhichGtypeGofGevidenceGshouldGaGforensicsGinvestigatorGuseGtoGidentifyGtheGsourceGofG
theGhack?
AGDiskGdriveGbackups
BGNetworkGtransactionGlogs
CGBrowserGhistory
DGEmailGheadersG-GB
AGforensicGscientistGarrivesGatGaGcrimeGsceneGtoGbeginGcollectingGevidence.
WhatGisGtheGfirstGthingGtheGforensicGscientistGshouldGdo?
AGTurnGoffGtheGpowerGtoGtheGentireGareaGbeingGexamined
BGUnplugGallGnetworkGconnectionsGsoGdataGcannotGbeGdeletedGremotely
CGGatherGupGallGphysicalGevidenceGandGmoveGitGoutGasGquicklyGasGpossible
DGPhotographGallGevidenceGinGitsGoriginalGplaceG-GD
WhichGmethodGofGcopyingGdigitalGevidenceGensuresGproperGevidenceGcollection?
AGMakeGtheGcopyGusingGfileGtransfer
BGCopyGfilesGusingGdragGandGdrop
CGMakeGtheGcopyGatGtheGbit-level
DGCopyGtheGlogicalGpartitionsG-GC
,WGU Course C840 -
G G G
Digital Forensics in Cybersecurity 2022
G G G G G G
Solved 100% G G
AGcomputerGinvolvedGinGaGcrimeGisGinfectedGwithGmalware.GTheGcomputerGisGonGandGc
onnectedGtoGtheGcompany'sGnetwork.GTheGforensicGinvestigatorGarrivesGatGtheGscene.
WhichGactionGshouldGbeGtheGinvestigator'sGfirstGstep?
AGRemoveGtheGmalwareGandGsecureGtheGcomputer.
BGUnplugGtheGcomputer'sGpowerGcord.
CGUnplugGtheGcomputer'sGEthernetGcable.
DGLabelGallGtheGattachmentsGandGsecureGtheGcomputer.G-GC
WhatGareGtheGthreeGbasicGtasksGthatGaGsystemsGforensicGspecialistGmustGkeepGinGmind
GwhenGhandlingGevidenceGduringGaGcybercrimeGinvestigation?
AnswerGoptionsGmayGbeGusedGmoreGthanGonceGorGnotGatGall.GSelectGyourGanswersGfro
mGtheGpull-downGlist.
1GPreserveGevidence
2GCatalogGevidence
3GPrepareGevidence
4GMakeGmultipleGcopiesGofGevidence
5GDisseminateGevidence
6GPrepareGevidenceGreport
7GFindGevidence
AG1,3,7
BG2,3,7G-GA
HowGdoGforensicGspecialistsGshowGthatGdigitalGevidenceGwasGhandledGinGaGprotected,G
secureGmannerGduringGtheGprocessGofGcollectingGandGanalyzingGtheGevidence?
AGForensicGlabGlogbooks
BGForensicGsoftwareGlogs
CGChainGofGcustody
DGChainGofGemailGmessagesG-GC
WhichGcharacteristicGappliesGtoGmagneticGdrivesGcomparedGtoGsolid-
stateGdrivesG(SSDs)?
AGLowerGcapacity
BGBetterGdurability
CGLowerGpowerGconsumption
DGLowerGcostG-GD
WhichGcharacteristicGappliesGtoGsolid-
stateGdrivesG(SSDs)GcomparedGtoGmagneticGdrives?
, WGU Course C840 -
G G G
Digital Forensics in Cybersecurity 2022
G G G G G G
Solved 100% G G
AGTheyGhaveGslowerGstart-upGtimes.
BGTheyGcostGless.
CGTheyGareGlessGsusceptibleGtoGdamage.
DGTheyGuseGmoreGpower.G-GC
WhichGtypeGofGstorageGformatGshouldGbeGtransportedGinGaGspecialGbagGtoGreduceGelect
rostaticGinterference?
AGSolid-stateGdrives
BGMagneticGmedia
CGDigitalGaudioGtapes
DGOpticalGmediaG-GB
WhichGWindowsGcomponentGisGresponsibleGforGreadingGtheGboot.iniGfileGandGdisplayin
gGtheGbootGloaderGmenuGonGWindowsGXPGduringGtheGbootGprocess?
AGWin32Gsubsystem
BGNTLDR
CGNTOSKRNL
DGWindowsGRegistryG-GB
TheGfollowingGlineGofGcodeGisGanGexampleGofGhowGtoGmakeGaGforensicGcopyGofGaGsuspe
ctGdrive:ddGif=/dev/memGof=/evidence/image.memory1
WhichGoperatingGsystemGshouldGbeGusedGtoGrunGthisGcommand?
AGChrome
BGBlackBerry
CGWindows
DGLinuxG-GD
WhichGfileGsystemGisGsupportedGbyGMac?
AGHierarchicalGFileGSystemGPlusG(HFS+)
BGExtendedGFileGSystemG(Ext)
CGBerkeleyGFastGFileGSystemG(FFS)
DGReiserGFileGSystemG(ReiserFS)G-GA
WhichGlawGrequiresGbothGpartiesGtoGconsentGtoGtheGrecordingGofGaGconversation?
AGHealthGInsuranceGPortabilityGandGAccountabilityGActG(HIPAA)
BGUSAGPatriotGAct
CGCommunicationsGAssistanceGtoGLawGEnforcementGActG(CALEA)
DGElectronicGCommunicationsGPrivacyGActG(ECPA)G-GD
G G G
Digital Forensics in Cybersecurity 2022
G G G G G G
Solved 100% G G
TheGchiefGinformationGofficerGofGanGaccountingGfirmGbelievesGsensitiveGdataGisGbeingGe
xposedGonGtheGlocalGnetwork.GWhichGtoolGshouldGtheGITGstaffGuseGtoGgatherGdigitalGevi
denceGaboutGthisGsecurityGvulnerability?
AGSniffer
BGDiskGanalyzer
CGTracer
DGVirusGscannerG-GA
AGpoliceGdetectiveGinvestigatingGaGthreatGtracesGtheGsourceGtoGaGhouse.GTheGcoupleGat
GtheGhouseGshowsGtheGdetectiveGtheGonlyGcomputerGtheGfamilyGowns,GwhichGisGinGtheirG
son'sGbedroom.GTheGcoupleGstatesGthatGtheirGsonGisGpresentlyGinGclassGatGaGlocalGmidd
leGschool.
HowGshouldGtheGdetectiveGlegallyGgainGaccessGtoGtheGcomputer?
AGObtainGaGsearchGwarrantGfromGtheGpolice
BGSeizeGtheGcomputerGunderGtheGUSAGPatriotGAct
CGObtainGconsentGtoGsearchGfromGtheGparents
DGSeizeGtheGcomputerGunderGtheGComputerGSecurityGActG-GC
HowGshouldGaGforensicGscientistGobtainGtheGnetworkGconfigurationGfromGaGWindowsGP
CGbeforeGseizingGitGfromGaGcrimeGscene?
AGByGusingGtheGipconfigGcommandGfromGaGcommandGpromptGonGtheGcomputer
BGByGusingGtheGtracertGcommandGfromGaGcommandGpromptGonGtheGcomputer
CGByGloggingGintoGtheGrouterGtoGwhichGtheGPCGisGconnected
DGByGinstallingGaGnetworkGpacketGsnifferGonGtheGcomputerG-GA
TheGhumanGresourcesGmanagerGofGaGsmallGaccountingGfirmGbelievesGheGmayGhaveGbe
enGaGvictimGofGaGphishingGscam.GTheGmanagerGclickedGonGaGlinkGinGanGemailGmessage
GthatGaskedGhimGtoGverifyGtheGlogonGcredentialsGforGtheGfirm'sGonlineGbankGaccount.
WhichGdigitalGevidenceGshouldGaGforensicGinvestigatorGcollectGtoGinvestigateGthisGincid
ent?
AGSystemGlog
BGSecurityGlog
CGDiskGcache
DGBrowserGcacheG-GD
AfterGaGcompany'sGsingle-
purpose,GdedicatedGmessagingGserverGisGhackedGbyGaGcybercriminal,GaGforensicsGexp
ertGisGhiredGtoGinvestigateGtheGcrimeGandGcollectGevidence.
WhichGdigitalGevidenceGshouldGbeGcollected?
,WGU Course C840 -
G G G
Digital Forensics in Cybersecurity 2022
G G G G G G
Solved 100% G G
AGWebGserverGlogs
BGFirewallGlogs
CGPhishingGemails
DGSpamGmessagesG-GB
ThomasGreceivedGanGemailGstatingGthatGheGneededGtoGfollowGaGlinkGandGverifyGhisGban
kGaccountGinformationGtoGensureGitGwasGsecure.GShortlyGafterGfollowingGtheGinstruction
s,GThomasGnoticedGmoneyGwasGmissingGfromGhisGaccount.
WhichGdigitalGevidenceGshouldGbeGconsideredGtoGdetermineGhowGThomas'GaccountGinf
ormationGwasGcompromised?
AGSocialGmediaGaccounts
BGRouterGlogs
CGFlashGdriveGcontents
DGEmailGmessagesG-GD
TheGchiefGexecutiveGofficerG(CEO)GofGaGsmallGcomputerGcompanyGhasGidentifiedGaGpot
entialGhackingGattackGfromGanGoutsideGcompetitor.G
WhichGtypeGofGevidenceGshouldGaGforensicsGinvestigatorGuseGtoGidentifyGtheGsourceGofG
theGhack?
AGDiskGdriveGbackups
BGNetworkGtransactionGlogs
CGBrowserGhistory
DGEmailGheadersG-GB
AGforensicGscientistGarrivesGatGaGcrimeGsceneGtoGbeginGcollectingGevidence.
WhatGisGtheGfirstGthingGtheGforensicGscientistGshouldGdo?
AGTurnGoffGtheGpowerGtoGtheGentireGareaGbeingGexamined
BGUnplugGallGnetworkGconnectionsGsoGdataGcannotGbeGdeletedGremotely
CGGatherGupGallGphysicalGevidenceGandGmoveGitGoutGasGquicklyGasGpossible
DGPhotographGallGevidenceGinGitsGoriginalGplaceG-GD
WhichGmethodGofGcopyingGdigitalGevidenceGensuresGproperGevidenceGcollection?
AGMakeGtheGcopyGusingGfileGtransfer
BGCopyGfilesGusingGdragGandGdrop
CGMakeGtheGcopyGatGtheGbit-level
DGCopyGtheGlogicalGpartitionsG-GC
,WGU Course C840 -
G G G
Digital Forensics in Cybersecurity 2022
G G G G G G
Solved 100% G G
AGcomputerGinvolvedGinGaGcrimeGisGinfectedGwithGmalware.GTheGcomputerGisGonGandGc
onnectedGtoGtheGcompany'sGnetwork.GTheGforensicGinvestigatorGarrivesGatGtheGscene.
WhichGactionGshouldGbeGtheGinvestigator'sGfirstGstep?
AGRemoveGtheGmalwareGandGsecureGtheGcomputer.
BGUnplugGtheGcomputer'sGpowerGcord.
CGUnplugGtheGcomputer'sGEthernetGcable.
DGLabelGallGtheGattachmentsGandGsecureGtheGcomputer.G-GC
WhatGareGtheGthreeGbasicGtasksGthatGaGsystemsGforensicGspecialistGmustGkeepGinGmind
GwhenGhandlingGevidenceGduringGaGcybercrimeGinvestigation?
AnswerGoptionsGmayGbeGusedGmoreGthanGonceGorGnotGatGall.GSelectGyourGanswersGfro
mGtheGpull-downGlist.
1GPreserveGevidence
2GCatalogGevidence
3GPrepareGevidence
4GMakeGmultipleGcopiesGofGevidence
5GDisseminateGevidence
6GPrepareGevidenceGreport
7GFindGevidence
AG1,3,7
BG2,3,7G-GA
HowGdoGforensicGspecialistsGshowGthatGdigitalGevidenceGwasGhandledGinGaGprotected,G
secureGmannerGduringGtheGprocessGofGcollectingGandGanalyzingGtheGevidence?
AGForensicGlabGlogbooks
BGForensicGsoftwareGlogs
CGChainGofGcustody
DGChainGofGemailGmessagesG-GC
WhichGcharacteristicGappliesGtoGmagneticGdrivesGcomparedGtoGsolid-
stateGdrivesG(SSDs)?
AGLowerGcapacity
BGBetterGdurability
CGLowerGpowerGconsumption
DGLowerGcostG-GD
WhichGcharacteristicGappliesGtoGsolid-
stateGdrivesG(SSDs)GcomparedGtoGmagneticGdrives?
, WGU Course C840 -
G G G
Digital Forensics in Cybersecurity 2022
G G G G G G
Solved 100% G G
AGTheyGhaveGslowerGstart-upGtimes.
BGTheyGcostGless.
CGTheyGareGlessGsusceptibleGtoGdamage.
DGTheyGuseGmoreGpower.G-GC
WhichGtypeGofGstorageGformatGshouldGbeGtransportedGinGaGspecialGbagGtoGreduceGelect
rostaticGinterference?
AGSolid-stateGdrives
BGMagneticGmedia
CGDigitalGaudioGtapes
DGOpticalGmediaG-GB
WhichGWindowsGcomponentGisGresponsibleGforGreadingGtheGboot.iniGfileGandGdisplayin
gGtheGbootGloaderGmenuGonGWindowsGXPGduringGtheGbootGprocess?
AGWin32Gsubsystem
BGNTLDR
CGNTOSKRNL
DGWindowsGRegistryG-GB
TheGfollowingGlineGofGcodeGisGanGexampleGofGhowGtoGmakeGaGforensicGcopyGofGaGsuspe
ctGdrive:ddGif=/dev/memGof=/evidence/image.memory1
WhichGoperatingGsystemGshouldGbeGusedGtoGrunGthisGcommand?
AGChrome
BGBlackBerry
CGWindows
DGLinuxG-GD
WhichGfileGsystemGisGsupportedGbyGMac?
AGHierarchicalGFileGSystemGPlusG(HFS+)
BGExtendedGFileGSystemG(Ext)
CGBerkeleyGFastGFileGSystemG(FFS)
DGReiserGFileGSystemG(ReiserFS)G-GA
WhichGlawGrequiresGbothGpartiesGtoGconsentGtoGtheGrecordingGofGaGconversation?
AGHealthGInsuranceGPortabilityGandGAccountabilityGActG(HIPAA)
BGUSAGPatriotGAct
CGCommunicationsGAssistanceGtoGLawGEnforcementGActG(CALEA)
DGElectronicGCommunicationsGPrivacyGActG(ECPA)G-GD