WGU C702 Forensics and Network Intrusion Exam || || || || || || ||
Prep questions with verified detailed solutions
|| || || || ||
||
Denial-of-service technique - ✔✔An attack that sends a large amount of data to overwhelm || || || || || || || || || || || || || ||
system resources. ||
Mail bombing - ✔✔A type of denial-of-service attack that involves sending a large volume of
|| || || || || || || || || || || || || || ||
emails to a target. || || ||
Acquiring data - ✔✔The step in computer crime forensics that requires an investigator to
|| || || || || || || || || || || || || ||
duplicate and image the collected digital information.
|| || || || || ||
Testifying in court - ✔✔The last step of a criminal investigation that requires the involvement of
|| || || || || || || || || || || || || || || ||
a computer forensic investigator.
|| || ||
Verifying an Android mobile device - ✔✔Checking to see if it is plugged into a computer without
|| || || || || || || || || || || || || || || || ||
potentially changing the original evidence. || || || ||
Aluminum foil - ✔✔An alternative to a Faraday bag for protecting a mobile device.
|| || || || || || || || || || || || ||
Search warrant innovation criterion - ✔✔Availability to the general public determines whether a
|| || || || || || || || || || || || ||
technology requires a search warrant. || || || ||
Seizing a hard drive without a warrant - ✔✔A law enforcement officer can seize a hard drive if
|| || || || || || || || || || || || || || || || || ||
the evidence is in imminent danger.
|| || || || ||
Investigation report - ✔✔A legal document that contains a summary of findings and is used to
|| || || || || || || || || || || || || || || ||
prosecute.
Faraday bag - ✔✔A protective bag used to prevent signals from reaching a mobile phone.
|| || || || || || || || || || || || || ||
,2
Ethical behavior while testifying - ✔✔Providing and explaining facts found during the
|| || || || || || || || || || || ||
investigation.
Search and seizure compliance - ✔✔What a government agent should have complied with during
|| || || || || || || || || || || || || ||
search and seizure in a case involving malware.
|| || || || || || ||
Flashing lights - ✔✔A method for a forensic investigator to verify an Android mobile device is
|| || || || || || || || || || || || || || || ||
on without interacting with the operating system.
|| || || || || ||
Sturdy container - ✔✔An alternative to a Faraday bag for protecting a mobile device.
|| || || || || || || || || || || || ||
Cardboard box - ✔✔An alternative to a Faraday bag for protecting a mobile device.
|| || || || || || || || || || || || ||
Bubble wrap - ✔✔An alternative to a Faraday bag for protecting a mobile device.
|| || || || || || || || || || || || ||
Dependency on third-party software - ✔✔A criterion that may determine whether a technology
|| || || || || || || || || || || || ||
used by government requires a search warrant.
|| || || || || ||
Implementation based on open source software - ✔✔A criterion that may determine whether a || || || || || || || || || || || || || ||
technology used by government requires a search warrant. || || || || || || ||
Use of cloud-based machine learning - ✔✔A criterion that may determine whether a technology
|| || || || || || || || || || || || || ||
used by government requires a search warrant.
|| || || || || ||
Suspicious occupant behavior - ✔✔Not a valid reason for a law enforcement officer to seize a
|| || || || || || || || || || || || || || || ||
hard drive without a warrant.
|| || || ||
Unattended computer - ✔✔Not a valid reason for a law enforcement officer to seize a hard drive
|| || || || || || || || || || || || || || || || ||
without a warrant. || ||
,2
Wide open front door - ✔✔Not a valid reason for a law enforcement officer to seize a hard drive
|| || || || || || || || || || || || || || || || || || ||
without a warrant. || ||
Fourth Amendment - ✔✔A part of the United States Constitution that protects citizens from
|| || || || || || || || || || || || || ||
unreasonable searches and seizures. || || ||
Stored Communications Act - ✔✔A law that governs the voluntary and involuntary disclosure of
|| || || || || || || || || || || || || ||
stored wire and electronic communications and transactional records.
|| || || || || || ||
Net Neutrality Bill - ✔✔Legislation that aims to ensure that internet service providers treat all
|| || || || || || || || || || || || || || ||
data on the internet the same, without discriminating or charging differently.
|| || || || || || || || || ||
Federal Rules of Evidence - ✔✔A set of rules that governs the introduction of evidence at civil
|| || || || || || || || || || || || || || || || ||
and criminal trials in federal courts.
|| || || || ||
Stego-only - ✔✔A method used in steganography where only the stego object is available to the
|| || || || || || || || || || || || || || || ||
investigator.
Known-stego - ✔✔A method where the investigator has access to both the stego object and the|| || || || || || || || || || || || || || || ||
method used to hide the information. || || || || ||
Known-message - ✔✔A method where the investigator has access to the plaintext message and || || || || || || || || || || || || || ||
uses it to find the hidden information.
|| || || || || ||
Chosen-message - ✔✔A method where the investigator can choose a plaintext message and || || || || || || || || || || || || ||
analyze it to find the hidden information.
|| || || || || ||
Linux - ✔✔An open-source operating system based on the Linux kernel.
|| || || || || || || || || ||
, 2
OS X - ✔✔An operating system developed by Apple Inc. for Macintosh computers.
|| || || || || || || || || || || ||
UNIX - ✔✔A powerful, multiuser operating system originally developed in the 1960s and 1970s.
|| || || || || || || || || || || || ||
Windows - ✔✔A series of operating systems developed by Microsoft for personal computers.
|| || || || || || || || || || || ||
Cain and Abel - ✔✔A password recovery tool for Microsoft Windows that can recover passwords
|| || || || || || || || || || || || || ||
by sniffing the network, cracking encrypted passwords, and more.
|| || || || || || || || ||
DaveGrohl - ✔✔A password cracker specifically designed to recover passwords on OS X
|| || || || || || || || || || || || ||
operating systems. ||
L0phtCrack - ✔✔A password auditing and recovery application for Windows. || || || || || || || || ||
Ophcrack - ✔✔An open-source Windows password cracker based on rainbow tables.
|| || || || || || || || || ||
Wireshark - ✔✔A network protocol analyzer that allows for the capture and analysis of network
|| || || || || || || || || || || || || || ||
traffic.
Administrative - ✔✔A type of cybercrime investigation approach focused on enforcing company || || || || || || || || || || || ||
policies and regulations. || ||
Enterprise Theory of Investigation - ✔✔A model that applies a holistic approach toward any
|| || || || || || || || || || || || || ||
criminal activity as a criminal operation. || || || || ||
Court warrant - ✔✔A legal document issued by a judge authorizing law enforcement to conduct a
|| || || || || || || || || || || || || || ||
search or seizure.
|| || ||