Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU Course C840 - Digital Forensics In Cybersecurity Quizlet By Brian Macfarlane Questions With Solved Solutions.

Rating
-
Sold
-
Pages
102
Grade
A+
Uploaded on
06-08-2024
Written in
2024/2025

WGU Course C840 - Digital Forensics In Cybersecurity Quizlet By Brian Macfarlane Questions With Solved Solutions.

Institution
WGU Course C840 - Digital Forensics In Cybersecur
Course
WGU Course C840 - Digital Forensics In Cybersecur

Content preview

WGU Course C840 - Digital Forensics In
Cybersecurity Quizlet By Brian Macfarlane
Questions With Solved Solutions.

The ychief yinformation yofficer yof yan yaccounting yfirm ybelieves ysensitive ydata yis ybeing yexposed yon ythe
ylocal ynetwork. yWhich ytool yshould ythe yIT ystaff yuse yto ygather ydigital yevidence yabout ythis ysecurity

yvulnerability?




A ySniffer

B yDisk yanalyzer

C yTracer

D yVirus yscanner y- y y y ycorrect yanswer.A



A ypolice ydetective yinvestigating ya ythreat ytraces ythe ysource yto ya yhouse. yThe ycouple yat ythe yhouse yshows
ythe ydetective ythe yonly ycomputer ythe yfamily yowns, ywhich yis yin ytheir yson's ybedroom. yThe ycouple ystates

ythat ytheir yson yis ypresently yin yclass yat ya ylocal ymiddle yschool.




How yshould ythe ydetective ylegally ygain yaccess yto ythe ycomputer?



A yObtain ya ysearch ywarrant yfrom ythe ypolice

B ySeize ythe ycomputer yunder ythe yUSA yPatriot yAct

C yObtain yconsent yto ysearch yfrom ythe yparents

D ySeize ythe ycomputer yunder ythe yComputer ySecurity yAct y- y y y ycorrect yanswer.C



How yshould ya yforensic yscientist yobtain ythe ynetwork yconfiguration yfrom ya yWindows yPC ybefore yseizing yit
yfrom ya ycrime yscene?




A yBy yusing ythe yipconfig ycommand yfrom ya ycommand yprompt yon ythe ycomputer

,B yBy yusing ythe ytracert ycommand yfrom ya ycommand yprompt yon ythe ycomputer

C yBy ylogging yinto ythe yrouter yto ywhich ythe yPC yis yconnected

D yBy yinstalling ya ynetwork ypacket ysniffer yon ythe ycomputer y- y y y ycorrect yanswer.A



The yhuman yresources ymanager yof ya ysmall yaccounting yfirm ybelieves yhe ymay yhave ybeen ya yvictim yof ya
yphishing yscam. yThe ymanager yclicked yon ya ylink yin yan yemail ymessage ythat yasked yhim yto yverify ythe ylogon

ycredentials yfor ythe yfirm's yonline ybank yaccount.




Which ydigital yevidence yshould ya yforensic yinvestigator ycollect yto yinvestigate ythis yincident?



A ySystem ylog

B ySecurity ylog

C yDisk ycache

D yBrowser ycache y- y y y ycorrect yanswer.D



After ya ycompany's ysingle-purpose, ydedicated ymessaging yserver yis yhacked yby ya ycybercriminal, ya
yforensics yexpert yis yhired yto yinvestigate ythe ycrime yand ycollect yevidence.




Which ydigital yevidence yshould ybe ycollected?



A yWeb yserver ylogs

B yFirewall ylogs

C yPhishing yemails

D ySpam ymessages y- y y y ycorrect yanswer.B



Thomas yreceived yan yemail ystating ythat yhe yneeded yto yfollow ya ylink yand yverify yhis ybank yaccount
yinformation yto yensure yit ywas ysecure. yShortly yafter yfollowing ythe yinstructions, yThomas ynoticed ymoney

ywas ymissing yfrom yhis yaccount.




Which ydigital yevidence yshould ybe yconsidered yto ydetermine yhow yThomas' yaccount yinformation ywas
ycompromised?

,A ySocial ymedia yaccounts

B yRouter ylogs

C yFlash ydrive ycontents

D yEmail ymessages y- y y y ycorrect yanswer.D



The ychief yexecutive yofficer y(CEO) yof ya ysmall ycomputer ycompany yhas yidentified ya ypotential yhacking
yattack yfrom yan youtside ycompetitor. y




Which ytype yof yevidence yshould ya yforensics yinvestigator yuse yto yidentify ythe ysource yof ythe yhack?



A yDisk ydrive ybackups

B yNetwork ytransaction ylogs

C yBrowser yhistory

D yEmail yheaders y- y y y ycorrect yanswer.B



A yforensic yscientist yarrives yat ya ycrime yscene yto ybegin ycollecting yevidence.



What yis ythe yfirst ything ythe yforensic yscientist yshould ydo?



A yTurn yoff ythe ypower yto ythe yentire yarea ybeing yexamined

B yUnplug yall ynetwork yconnections yso ydata ycannot ybe ydeleted yremotely

C yGather yup yall yphysical yevidence yand ymove yit yout yas yquickly yas ypossible

D yPhotograph yall yevidence yin yits yoriginal yplace y- y y y ycorrect yanswer.D



Which ymethod yof ycopying ydigital yevidence yensures yproper yevidence ycollection?



A yMake ythe ycopy yusing yfile ytransfer

B yCopy yfiles yusing ydrag yand ydrop

, C yMake ythe ycopy yat ythe ybit-level

D yCopy ythe ylogical ypartitions y- y y y ycorrect yanswer.C



A ycomputer yinvolved yin ya ycrime yis yinfected ywith ymalware. yThe ycomputer yis yon yand yconnected yto ythe
ycompany's ynetwork. yThe yforensic yinvestigator yarrives yat ythe yscene.




Which yaction yshould ybe ythe yinvestigator's yfirst ystep?



A yRemove ythe ymalware yand ysecure ythe ycomputer.

B yUnplug ythe ycomputer's ypower ycord.

C yUnplug ythe ycomputer's yEthernet ycable.

D yLabel yall ythe yattachments yand ysecure ythe ycomputer. y- y y y ycorrect yanswer.C



What yare ythe ythree ybasic ytasks ythat ya ysystems yforensic yspecialist ymust ykeep yin ymind ywhen yhandling
yevidence yduring ya ycybercrime yinvestigation?




Answer yoptions ymay ybe yused ymore ythan yonce yor ynot yat yall. ySelect yyour yanswers yfrom ythe ypull-down
ylist.




1 yPreserve yevidence

2 yCatalog yevidence

3 yPrepare yevidence

4 yMake ymultiple ycopies yof yevidence

5 yDisseminate yevidence

6 yPrepare yevidence yreport

7 yFind yevidence



A y1,3,7

B y2,3,7 y- y y y ycorrect yanswer.A

Written for

Institution
WGU Course C840 - Digital Forensics In Cybersecur
Course
WGU Course C840 - Digital Forensics In Cybersecur

Document information

Uploaded on
August 6, 2024
Number of pages
102
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$14.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
drDON

Get to know the seller

Seller avatar
drDON Johnson And Wales University
Follow You need to be logged in order to follow users or courses
Sold
4
Member since
1 year
Number of followers
0
Documents
548
Last sold
3 weeks ago

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions