Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

C702 – CHFI Newest Exam with precise detailed solutions

Rating
-
Sold
-
Pages
80
Grade
A+
Uploaded on
04-04-2026
Written in
2025/2026

C702 – CHFI Newest Exam with precise detailed solutions

Institution
C702
Course
C702

Content preview

2



C702 – CHFI Newest Exam with precise detailed || || || || || || || ||




solutions


Which of the following is true regarding computer forensics?
|| || || || || || || ||




A. Computer forensics deals with the process of finding evidence related to a digital crime to find
|| || || || || || || || || || || || || || || || ||




the culprits and initiate legal action against them.
|| || || || || || ||




B. Computer forensics deals with the process of finding evidence related to a digital crime to find
|| || || || || || || || || || || || || || || || ||




the culprits and avoid legal action against them.
|| || || || || || ||




C. Computer forensics deals with the process of finding evidence related to a crime to find the
|| || || || || || || || || || || || || || || || ||




culprits and initiate legal action against them.
|| || || || || ||




D. Computer forensics deals with the process of finding evidence related to a digital crime to find
|| || || || || || || || || || || || || || || || ||




the victims and prevent legal action against them. - ✔✔A. Computer forensics deals with the
|| || || || || || || || || || || || || || ||




process of finding evidence related to a digital crime to find the culprits and initiate legal action
|| || || || || || || || || || || || || || || || ||




against them. ||




Ref: Module 1, page 19
|| || || ||




Which of the following is not an objective of computer forensics?
|| || || || || || || || || ||




A. Document vulnerabilities allowing further loss of intellectual property, finances, and
|| || || || || || || || || || ||




reputation during an attack. || || ||




B. Interpret, document, and present the evidence to be admissible during prosecution.
|| || || || || || || || || || ||




C. Track and prosecute the perpetrators in a court of law.
|| || || || || || || || || ||




D. Identify, gather, and preserve the evidence of a cybercrime. - ✔✔A. Document vulnerabilities
|| || || || || || || || || || || || || ||




allowing further loss of intellectual property, finances, and reputation during an attack.
|| || || || || || || || || || ||




Ref: Module 1, page 19
|| || || ||




Forensic readiness refers to ________.|| || || ||




A. having no impact on prospects of successful legal action
|| || || || || || || || ||




B. the establishment of specific incident response procedures and designated trained personnel to
|| || || || || || || || || || || || ||




prevent a breach || ||




C. replacing the need to meet all regulatory requirements
|| || || || || || || ||

,2


D. an organization's ability to make optimal use of digital evidence in a limited time period and
|| || || || || || || || || || || || || || || || ||




with minimal investigation costs - ✔✔D. an organization's ability to make optimal use of digital
|| || || || || || || || || || || || || || ||




evidence in a limited time period and with minimal investigation costs
|| || || || || || || || || ||




Ref: Module 1, page 31
|| || || ||




What is not an impact of cybercrime?
|| || || || || ||




A. Huge financial gain
|| || ||




B. Loss of customer and stakeholder trust
|| || || || || ||




C. Substantial reputational damage
|| || ||




D. Theft of sensitive data - ✔✔A. Huge financial gain
|| || || || || || || || ||




Ref: Module 1, page 28
|| || || ||




Which of the following is true of cybercrimes?
|| || || || || || ||




A. The searching of the devices is based on mutual understanding and provides a wider time
|| || || || || || || || || || || || || || || ||




frame to hide the evidence. || || || ||




B. Investigators attempt to demonstrate information to the opposite party to support the claims
|| || || || || || || || || || || || || ||




and induce settlement.
|| ||




C. The claimant is responsible for the collection and analysis of the evidence.
|| || || || || || || || || || || ||




D. Investigators, with a warrant, have the authority to forcibly seize the computing devices. -
|| || || || || || || || || || || || || || ||




✔✔D. Investigators, with a warrant, have the authority to forcibly seize the computing devices.
|| || || || || || || || || || || || ||




Ref: Module 1, page 30
|| || || ||




Which of the following is true of civil crimes?
|| || || || || || || ||




A. A formal investigation report is required.
|| || || || || ||




B. The standards of proof need to be very high.
|| || || || || || || || ||




C. The initial reporting of the evidence is generally informal.
|| || || || || || || || ||




D. Law enforcement agencies are responsible for collecting and analyzing evidence. - ✔✔C. The
|| || || || || || || || || || || || || ||




initial reporting of the evidence is generally informal.
|| || || || || || ||




Ref: Module 1, page 31
|| || || ||

,2




Which of the following is a user-created source of potential evidence?
|| || || || || || || || || ||




A. Address book
|| ||




B. Cookies
||




C. Printer spool
|| ||




D. Log files - ✔✔A. Address book
|| || || || || ||




Ref: Module 1, page 39
|| || || ||




Which of the following is a computer-created source of potential evidence?
|| || || || || || || || || ||




A. Spreadsheet
||




B. Bookmarks
||




C. Steganography
||




D. Swap file - ✔✔D. Swap file
|| || || || || ||




Ref: Module 1, page 39
|| || || ||




Which of the following is not where potential evidence may be located?
|| || || || || || || || || || ||




A. Smart card
|| ||




B. Digital camera
|| ||




C. Thumb drive
|| ||




D. Processor - ✔✔D. Processor
|| || || ||




Ref: Module 1, pages 37-38
|| || || ||




Under which of the following conditions will duplicate evidence not suffice?
|| || || || || || || || || ||




A. When original evidence is in possession of a third party
|| || || || || || || || || ||




B. When original evidence is destroyed in the normal course of business
|| || || || || || || || || || ||




C. When original evidence is in possession of the originator
|| || || || || || || || ||

, 2


D. When original evidence is destroyed due to fire or flood - ✔✔C. When original evidence is in
|| || || || || || || || || || || || || || || || || ||




possession of the originator || || ||




Ref: Module 1, page 42
|| || || ||




Which of the following Federal Rules of Evidence contains Rulings on Evidence?
|| || || || || || || || || || ||




A. Rule 103
|| ||




B. Rule 102
|| ||




C. Rule 101
|| ||




D. Rule 105 - ✔✔A. Rule 103
|| || || || || ||




Ref: Module 1, page 46
|| || || ||




Which of the following Federal Rules of Evidence ensures that the truth may be ascertained and
|| || || || || || || || || || || || || || || ||




the proceedings justly determined?
|| || ||




A. Rule 103
|| ||




B. Rule 105
|| ||




C. Rule 102
|| ||




D. Rule 101 - ✔✔C. Rule 102
|| || || || || ||




Ref: Module 1, page 46
|| || || ||




Which of the following Federal Rules of Evidence governs proceedings in the courts of the
|| || || || || || || || || || || || || || ||




United States? ||




A. Rule 102
|| ||




B. Rule 103
|| ||




C. Rule 105
|| ||




D. Rule 101 - ✔✔D. Rule 101
|| || || || || ||




Ref: Module 1, page 45
|| || || ||

Written for

Institution
C702
Course
C702

Document information

Uploaded on
April 4, 2026
Number of pages
80
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$23.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Ruiz Liberty University
Follow You need to be logged in order to follow users or courses
Sold
96
Member since
1 year
Number of followers
1
Documents
13885
Last sold
1 week ago
Top-Quality Study Materials for Success – Ace Your Exams with Expert Resources!

Access high-quality study materials to help you excel in your exams. Get notes, summaries, and guides tailored to your courses!

3.2

15 reviews

5
4
4
4
3
2
2
1
1
4

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions