Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

C702 Computer Hacking Forensics Investigator (CHFI) v10 Exam with precise detailed solutions

Rating
-
Sold
-
Pages
22
Grade
A+
Uploaded on
04-04-2026
Written in
2025/2026

C702 Computer Hacking Forensics Investigator (CHFI) v10 Exam with precise detailed solutions

Institution
C702
Course
C702

Content preview

2


C702 Computer Hacking Forensics Investigator (CHFI) v10 || || || || || || ||




Exam with precise detailed solutions || || || ||




What is computer forensics? || || ||




It refers to a set of methodological procedures and techniques to identify, gather, preserve, extract,
|| || || || || || || || || || || || || ||




interpret, document, and present evidence from computing equipment such that the discovered
|| || || || || || || || || || || || ||




evidence is acceptable during a legal and/or administrative proceeding in a court of law.
|| || || || || || || || || || || || ||




Cybercrime
any illegal act that involves computing systems, applications, or network.
|| || || || || || || || ||




Cybercrime Investigation ||




any illegal act that involves computing systems, applications, or network.
|| || || || || || || || ||




Criminal Case ||




involve actions that go against the interests of society, the burden of proving that the accused is
|| || || || || || || || || || || || || || || || ||




guilty lies entirely with the prosecution.
|| || || || ||




Civil cases ||




wherein the plaintiff registers the case and is responsible for the burden of proof while the
|| || || || || || || || || || || || || || || ||




authority hears both parties and passes the judgment based on the evidence presented.
|| || || || || || || || || || || ||




Administrative Investigation ||




an internal investigation by an organization to discover if its employees, clients, and partners are
|| || || || || || || || || || || || || || ||




complying with the rules or policies. || || || || ||




Digital Evidence ||




probative information stored on or transmitted through an electronic device.
|| || || || || || || || ||




Volatile data ||




the temporary information on a digital device that requires a constant power supply and is deleted
|| || || || || || || || || || || || || || || ||




if the power supply is interrupted.
|| || || || ||




Non-volatile data ||




the permanent data stored on secondary storage devices, such as hard disks and memory cards.
|| || || || || || || || || || || || || ||




Three types of sources for potential evidence
|| || || || || ||

,2


- User-Created Files
|| ||




- User-Protected Files
|| ||




- Computer-Created Files
|| ||




Five basic rules of evidence || || || ||




- Understandable: present the evidence in a clear and comprehensible manner to the members of
|| || || || || || || || || || || || || || ||




the jury ||




- Admissible: should be relevant to the case, act in support of the client presenting it, and be well-
|| || || || || || || || || || || || || || || || || ||




communicated and non-prejudiced || ||




- Authentic: provide supporting documents regarding the authenticity of the evidence
|| || || || || || || || || ||




- Reliable: extract and handle the evidence while maintaining a record of the tasks performed
|| || || || || || || || || || || || || || ||




during the process using only copies of the evidence.
|| || || || || || || ||




- Complete: it must either prove or disprove the consensual fact in the litigation.
|| || || || || || || || || || || || ||




Incident Response ||




process of responding to incidents that may have occurred due to a security breach or other
|| || || || || || || || || || || || || || || ||




incidents that potentially compromise the system or network. || || || || || || ||




Security Operations Center (SOC) || || ||




a centralized unit that continuously monitors, manages, and analyzes ongoing activities on the
|| || || || || || || || || || || || ||




organization's information systems, such as networks, servers, endpoints, databases, applications, || || || || || || || || || ||




and websites. ||




Gramm-Leach-Bliley Act (GLBA) || ||




requires financial institutions-companies to explain their information-sharing practices to their
|| || || || || || || || || ||




customers and to safeguard sensitive data. || || || || ||




Federal Information Security Modernization Act of 2014 (FISMA)
|| || || || || || ||




introduced as an amendment to the Federal Information Security Management Act of 2002, which
|| || || || || || || || || || || || ||




was implemented to provide a framework for federal information systems to have more effective
|| || || || || || || || || || || || || || ||




information security controls in place. || || || ||




Health Insurance Portability and Accountability Act of 1996 (HIPAA)
|| || || || || || || ||




provides federal protections for individually identifiable health information
|| || || || || || ||




The Electronic Communications Privacy Act of 1986
|| || || || || ||




protects wire, oral, and electronic communications, while such communications are being made,
|| || || || || || || || || || || ||




are in transit, and stored on computers. The Act applies to email, telephone conversations, and
|| || || || || || || || || || || || || || ||




data stored electronically. || ||




General Data Protection Regulation (GDPR) || || || ||

, 2


data privacy laws across Europe, to protect and empower all EU citizens' data privacy, and to
|| || || || || || || || || || || || || || || ||




reshape the way organizations across the region approach data privacy.
|| || || || || || || || ||




Payment Card Industry Data Security Standard (PCI DSS) || || || || || || ||




a proprietary information security standard for organizations that handle cardholder information
|| || || || || || || || || || ||




for the major debit, credit, prepaid, e-purse, ATM, and POS cards.
|| || || || || || || || || ||




Sarbanes-Oxley Act (SOX) of 2002 || || || ||




protect investors from the possibility of fraudulent accounting activities by corporations.
|| || || || || || || || || ||




Foreign Intelligence Surveillance Act of 1978 (FISA)
|| || || || || ||




procedures for requesting judicial authorization for electronic surveillance and physical search of
|| || || || || || || || || || || ||




persons engaged in espionage or international terrorism against the United States on behalf of a
|| || || || || || || || || || || || || || ||




foreign power. ||




Protect America Act of 2007 || || || ||




amends FISA to state that nothing under its definition of "electronic surveillance" shall be
|| || || || || || || || || || || || || ||




construed to encompass surveillance directed at a person reasonably believed to be located
|| || || || || || || || || || || || ||




outside the United States. || || ||




Privacy Act of 1974 || || ||




establishes a code of fair information practices that governs the collection, maintenance, use, and
|| || || || || || || || || || || || || ||




dissemination of information about individuals that is maintained in systems of records by federal || || || || || || || || || || || || || ||




agencies.
National Information Infrastructure Protection Act of 1996
|| || || || || ||




revises federal criminal code provisions regarding fraud and related activity in connection with
|| || || || || || || || || || || || ||




computers.
Computer Security Act of 1987 || || || ||




"It directs the National Bureau of Standards to establish a computer standards program for Federal
|| || || || || || || || || || || || || ||




computer systems, including guidelines for the security of such systems.
|| || || || || || || || || ||




The Freedom of Information Act
|| || || ||




initially enacted in 1966, provides that any person has the right to request access to federal agency
|| || || || || || || || || || || || || || || ||




records or information except to the extent the records are protected from disclosure by any of the
|| || || || || || || || || || || || || || || || ||




nine exemptions contained in the law or by one of the three special law enforcement record
|| || || || || || || || || || || || || || || || ||




exclusions.
Forensic Readiness ||

Written for

Institution
C702
Course
C702

Document information

Uploaded on
April 4, 2026
Number of pages
22
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$19.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Ruiz Liberty University
Follow You need to be logged in order to follow users or courses
Sold
96
Member since
1 year
Number of followers
1
Documents
13885
Last sold
1 week ago
Top-Quality Study Materials for Success – Ace Your Exams with Expert Resources!

Access high-quality study materials to help you excel in your exams. Get notes, summaries, and guides tailored to your courses!

3.2

15 reviews

5
4
4
4
3
2
2
1
1
4

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions