Garantie de satisfaction à 100% Disponible immédiatement après paiement En ligne et en PDF Tu n'es attaché à rien 4,6 TrustPilot
logo-home
Examen

WGU D431 DIGITAL FORENSICS ACTUAL OBJECTIVE ASSESSMENT LATEST 2025 COMPLETE REAL QUESTIONS AND CORRECT ANSWERS (100 CORRECT VERIFIED SOLUTIONS) NEWEST UPDATED VERSION

Note
-
Vendu
-
Pages
37
Grade
A+
Publié le
26-04-2025
Écrit en
2024/2025

WGU D431 DIGITAL FORENSICS ACTUAL OBJECTIVE ASSESSMENT LATEST 2025 COMPLETE REAL QUESTIONS AND CORRECT ANSWERS (100 CORRECT VERIFIED SOLUTIONS) NEWEST UPDATED VERSION

Établissement
Cours











Oups ! Impossible de charger votre document. Réessayez ou contactez le support.

Livre connecté

École, étude et sujet

Cours

Infos sur le Document

Publié le
26 avril 2025
Nombre de pages
37
Écrit en
2024/2025
Type
Examen
Contient
Questions et réponses

Sujets

Aperçu du contenu

WGU D431 DIGITAL FORENSICS OBJECTIVE ASSESS
d d d d d



MENT NEWEST ACTUAL EXAM COMPLETE 200 QUE
d d d d d d



STIONS AND CORRECT DETAILED ANSWERS (VERI d d d d d



FIE ANSWERS) |ALREADY GRADED A+||BRAND NEW!
d d d d d



!



Which law requires both parties to consent to the recording of a conv
d d d d d d d d d d d d


ersation? - d


ANSWER >>>>ECPA (Electronic Communications Privacy Act)
d d d d d d




Which law is related to the disclosure of personally identifiable prote
d d d d d d d d d d


cted health information (PHI)? -
d d d d


dANSWER >>>>Health Insurance Portability and Accountability Act
d d d d d d d


(HIPAA)

Which U.S. law criminalizes the act of knowingly using a misleading
d d d d d d d d d d d


domain name with the intent to deceive a minor into viewing harmful
d d d d d d d d d d d d


material? - ANSWER >>>>18 U.S.C. 2252B
d d d d d




Which U.S. law protects journalists from turning over their work or so
d d d d d d d d d d d


urces to law enforcement before the information is shared with the p
d d d d d d d d d d d


ublic? - ANSWER >>>>The Privacy Protection Act (PPA)
d d d d d d d




Which law or guideline lists the four states a mobile device can be in
d d d d d d d d d d d d d d


when data is extracted from it? - ANSWER >>>>NIST SP 800-
d d d d d d d d d d


72 Guidelines
d d




Which law includes a provision permitting the wiretapping of VoIP ca
d d d d d d d d d d


lls? - d


dANSWER >>>>Communications Assistance to Law Enforcement
d d d d d d


Act (CALEA)
d




Which policy is included in the CAN-SPAM Act? - ANSWER
d d d d d d d d d


>>>>The email sender must provide some mechanism whereby
d d d d d d d

,the receiver can opt out of future emails and that method cannot req
d d d d d d d d d d d d


uire the receiver to pay in order to opt out.
d d d d d d d d d




Which United States law requires telecommunications equipment
d d d d d d d


manufacturers to provide built- d d d


in surveillance capabilities for federal agencies? -
d d d d d d


dANSWER >>>>Communication Assistance to Law Enforcement Ac d d d d d d


t (CALEA)
d




Which law requires a search warrant or one of the recognized excep
d d d d d d d d d d d


tions to the search warrant requirements for searching email messa
d d d d d d d d d


ges on a computer? - d d d d


dANSWER >>>>The Fourth Amendment to the U.S. Constitution d d d d d d d




Where are local passwords stored for the Windows operating syste
d d d d d d d d d


m? - ANSWER >>>>SAM file in \Windows\System32\
d d d d d d




Where on a Windows system is the config folder located that contain
d d d d d d d d d d d


s the SAM file? - ANSWER >>>>C:\Windows\System32
d d d d d d




A forensic examiner wants to try to extract passwords for wireless ne
d d d d d d d d d d d


tworks to which a system was connected. Where should passwords
d d d d d d d d d d


for wireless networks be stored on a Windows XP system? -
d d d d d d d d d d


dANSWER >>>>Registry d




Which Windows password cracking tool uses rainbow tables? -
d d d d d d d d


ANSWER >>>>Ophcrack
d d




How does a rainbow table work to crack a password? - ANSWER
d d d d d d d d d d d


>>>>It uses a table of all possible keyboard combinations and their
d d d d d d d d d d d


hash values, then searches for a match.
d d d d d d




What should a forensic investigator use to gather the most reliable r
d d d d d d d d d d d


outing information for tracking an email message? -
d d d d d d d


ANSWER >>>>Email header
d d d

,Which activity involves email tracing? - ANSWER
d d d d d d


>>>>Determining the ownership of the source email server d d d d d d d




A forensic examiner reviews a laptop running OS X which has been
d d d d d d d d d d d d


compromised. The examiner wants to know if there were any mount d d d d d d d d d d


ed volumes created from USB drives. Which digital evidence shoul
d d d d d d d d d


d be reviewed? - ANSWER >>>>/var/log
d d d d d




Which log or folder contains information about printed documents on
d d d d d d d d d


a computer running Mac OS X? - ANSWER
d d d d d d d d


>>>>/var/spool/cups

Which Windows event log should be checked for evidence of invalid
d d d d d d d d d d d


logon attempts? - ANSWER >>>>Security
d d d d




A cyber security organization has issued a warning about a cybercri
d d d d d d d d d d


minal who is using a known vulnerability to attack unpatched corpor
d d d d d d d d d d


ate Macintosh systems. A network administrator decides to examin
d d d d d d d d


e the software updates logs on a Macintosh system to ensure the sy
d d d d d d d d d d d d


stem has been patched. Which folder contains the software updates
d d d d d d d d d


logs? - ANSWER
d d d


>>>>/Library/Receipts

A forensic investigator wants to image an older BlackBerry smartph
d d d d d d d d d


one running OS 7.0. Which tool should the investigator use? -
d d d d d d d d d d


ANSWER >>>>BlackBerry Desktop Manager
d d d d




An investigator wants to extract information from a mobile device by
d d d d d d d d d d d


connecting it to a computer. What should the investigator take great
d d d d d d d d d d d


care to ensure? - d d d


ANSWER >>>>That the mobile device does not synchronize with t
d d d d d d d d d d


he computer
d




Which state is a device in if it is powered on, performing tasks, and a
d d d d d d d d d d d d d d


ble to be manipulated by the user? - ANSWER >>>>Active
d d d d d d d d d

, The chief information officer of an accounting firm believes sensitive
d d d d d d d d d


data is being exposed on the local network. Which tool should the IT
d d d d d d d d d d d d d d


staff use to gather digital evidence about this security vulnerability? -
d d d d d d d d d d


ANSWER >>>>Sniffer
d d




A police detective investigating a threat traces the source to a house
d d d d d d d d d d d


. The couple at the house shows the detective the only computer the
d d d d d d d d d d d d


dfamily owns, which is in their son's bedroom. The couple states that
d d d d d d d d d d d d


their son is presently in class at a local middle school. How should th
d d d d d d d d d d d d d


e detective legally gain access to the computer? -
d d d d d d d d


dANSWER >>>>Obtain consent to search from the parents d d d d d d d




How should a forensic scientist obtain the network configuration fro
d d d d d d d d d


m a Windows PC before seizing it from a crime scene? -
d d d d d d d d d d d


ANSWER >>>>By using the ipconfig command from a command pr
d d d d d d d d d d


ompt on the computer d d d




The human resources manager of a small accounting firm believes
d d d d d d d d d d


he may have been a victim of a phishing scam. The manager clicked
d d d d d d d d d d d d


don a link in an email message that asked him to verify the logon cred
d d d d d d d d d d d d d d


entials for the firm's online bank account.
d d d d d d


Which digital evidence should a forensic investigator collect to inves
d d d d d d d d d


tigate this incident? - ANSWER >>>>Browser Cache
d d d d d d




After a company's single- d d d


purpose, dedicated messaging server is hacked by a cybercriminal,
d d d d d d d d d


a forensics expert is hired to investigate the crime and collect eviden
d d d d d d d d d d d


ce.Which digital evidence should be collected? - d d d d d d


ANSWER >>>>Firewall Logs
d d d




Thomas received an email stating that he needed to follow a link and
d d d d d d d d d d d d


verify his bank account information to ensure it was secure. Shortly
d d d d d d d d d d d d


after following the instructions, Thomas noticed money was missing
d d d d d d d d


from his account. Which digital evidence should be
d d d d d d d d
€18,72
Accéder à l'intégralité du document:

Garantie de satisfaction à 100%
Disponible immédiatement après paiement
En ligne et en PDF
Tu n'es attaché à rien

Faites connaissance avec le vendeur

Seller avatar
Les scores de réputation sont basés sur le nombre de documents qu'un vendeur a vendus contre paiement ainsi que sur les avis qu'il a reçu pour ces documents. Il y a trois niveaux: Bronze, Argent et Or. Plus la réputation est bonne, plus vous pouvez faire confiance sur la qualité du travail des vendeurs.
JOHNNKABIRU Teachme2-tutor
S'abonner Vous devez être connecté afin de suivre les étudiants ou les cours
Vendu
14
Membre depuis
9 mois
Nombre de followers
7
Documents
798
Dernière vente
1 mois de cela

4,7

712 revues

5
567
4
97
3
39
2
6
1
3

Récemment consulté par vous

Pourquoi les étudiants choisissent Stuvia

Créé par d'autres étudiants, vérifié par les avis

Une qualité sur laquelle compter : rédigé par des étudiants qui ont réussi et évalué par d'autres qui ont utilisé ce document.

Le document ne convient pas ? Choisis un autre document

Aucun souci ! Tu peux sélectionner directement un autre document qui correspond mieux à ce que tu cherches.

Paye comme tu veux, apprends aussitôt

Aucun abonnement, aucun engagement. Paye selon tes habitudes par carte de crédit et télécharge ton document PDF instantanément.

Student with book image

“Acheté, téléchargé et réussi. C'est aussi simple que ça.”

Alisha Student

Foire aux questions