Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU D431 DIGITAL FORENSICS IN CYBERSECURITY EXAM

Rating
-
Sold
-
Pages
17
Grade
A+
Uploaded on
27-10-2024
Written in
2024/2025

WGU D431 DIGITAL FORENSICS IN CYBERSECURITY EXAM

Institution
Course

Content preview

WGU D431 DIGITAL FORENSICS IN CYBERSECURITY
EXAM 2024 ACTUAL EXAM COMPLETE 200 QUESTIONS
WITH DETAILED VERIFIED ANSWERS (100% CORRECT
ANSWERS) /ALREADY GRADED A+
Criminal Law - ANSWER: The victim is "society" or the state

Civil Law - ANSWER: Penalties consist of financial restitution to the victim

Salami fraud - ANSWER: "slicing technique"; An attack consisting of a series of small
thefts spread over a large number of victims

Misdemeanor - ANSWER: a criminal charge where the maximum penalty is less than
one year incarceration

when creating your forensic toolkit, which two of the following items are essential to
your kit? - ANSWER: High-end processor; Forensic write blocker

Any digital evidence that is obtained without a search warrant is inadmissible in
court - ANSWER: False

if the chain of custody is broken the digital evidence will not stand up to scrutiny -
ANSWER: True

what is the most logical order for these events in regards to securing evidence? -
ANSWER: photograph, label, transport, present in court, return to owner

Subsequent to a search warrant where evidence is seized, what items should be left
behind? - ANSWER: Copy of the search warrant; list of items seized.

When the MFT or FAT is deleted or damaged, the files on partition are unrecoverable
- ANSWER: False

the unused space in a disk cluster is referred to as - ANSWER: slack space

which operating systems support the FAT32 file system - ANSWER: Windows XP/ME

you cannot format a 3.5 floppy disk with the NTFS file system - ANSWER: TRUE

courts have ruled that under any circumstances, a copy (or duplicate) of digital
evidence is admissible as an original as long as someone can - ANSWER: Authenticate
it

the goal of digital evidence acquisition process is to duplicate the original evidence in
a manner that - ANSWER: Protects; Preserves

,what are the three most widely used hashing authentication methods - ANSWER:
MD5;SHA1;CRC32

the MD5 hash algorithm produces a ______value - ANSWER: 128 bit

why is it preferred that the acquisition be conducted in the forensic laboratory -
ANSWER: the lab is a "controlled" environment, usually to avoid contamination; the
lab maintains additional resources not usually available "on scene"; there is less risk
of "cross-contamination" in a controlled laboratory setting

a computer forensic examination is any specific principle or technique that can be
applied to ____,______,_____ or ______ evidence during a criminal or civil
investigation - ANSWER: Identifying, recovering, reconstruction, analyzing

what is the main reason digital forensics diverges from the more traditional areas of
forensic investigations - ANSWER: the rate of technological change

which of the following is NOT one of the Alpha 5 protocols - ANSWER: Attack

creating "digital fingerprints" or cryptographic (hashing) checksums is part of which
phase of he Alpha 5 - ANSWER: Authentication

which of the following is not one of the four "Cardinal Rules" of computer forensics -
ANSWER: never document until all evidence is evaluated

A "target" describes - ANSWER: the object of a crime (victim)

what is the process of effectively finding digitalo based evidence - ANSWER: Digital
Forensic Analysis

to gather digital evidence based upon "levels of proof", Criminal proof is defined as
_____ and civil is _______ - ANSWER: Beyond a reasonable doubt; confirmation of a
fact by evidence

what is information readily available and accessible to the end-user? - ANSWER:
Backup datea

Data file of information that are no longer in active use, but stored separately to free
space on a hard drive are reffered to as - ANSWER: Archival data

"anyone or anything entering a crime/incident scene takes something with them and
leaves something of themselves behind when they depart - ANSWER: Locard's
Principle

what two processes carry out classification - ANSWER: Individualization;Comparison

, Inculpatory evidence - ANSWER: evidence that supports a given theory

exculpatory evidence - ANSWER: Evidence that contradicts a given theory

Weight of evidence - ANSWER: the strength, value and believability of evidence
presented on a factual issue by one side as compared to evidence introduced by the
other side is referred to:

Quality Assurance (QA) - ANSWER: what refers to the the measure that are taken by
the laboratory to monitor, verify, and document its performance

Quality Control (QC) - ANSWER: Quality Assurance serves as a functional check on
_____ in a laboratory

An efficient quality assurance program for a computer forensic laboratory involves
smooth integration of: - ANSWER: People, equipment, and protocols

Standard Operating Procedures (SOPs) - ANSWER: What baseline document may
allow your computer forensic laboratory operations to run smoothly?

What documents should be submitted at the completion of each computer forensic
examination? - ANSWER: Report of Investigation; Report of examination

What type of technology should be used to preview digital media in a GUI
environment without making changed to the media? - ANSWER: read only

Tools that may be used to try to conduct a preview of digital media - ANSWER:
Access data FTK; Guidance Software's Encase; Mount Image Pro

the goal of digital evidence processing is to ______ and examine the data - ANSWER:
gain access to the data

why is recording the time/date information from the CMOS crucial to the
investigation? - ANSWER: it is helpful in correlating temporal data during the analysis
phase

Destruction; Damage; Alteration - ANSWER: As a computer forensic examiner, you
want to disconnect storage devices to protect data from:

Digital Artifact - ANSWER: A digital file produced or shaped by human craft, which
retains investigative or historical interest is called:

all persons involved in conducting examination of digital evidence should be: -
ANSWER: trained for this purpose

Connected book

Written for

Course

Document information

Uploaded on
October 27, 2024
Number of pages
17
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$18.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
charitywairimuuu Teachme2-tutor
Follow You need to be logged in order to follow users or courses
Sold
18
Member since
1 year
Number of followers
2
Documents
1295
Last sold
6 months ago
EXCELLENT HOMEWORK HELP AND TUTORING ,

EXCELLENT HOMEWORK HELP AND TUTORING ,ALL KIND OF QUIZ AND EXAMS WITH GUARANTEE OF A EXCELLENT HOMEWORK HELP AND TUTORING ,ALL KIND OF QUIZ AND EXAMS WITH GUARANTEE OF A Am an expert on major courses especially; psychology,Nursing, Human resource Management and Mathemtics Assisting students with quality work is my first priority. I ensure scholarly standards in my documents and that\'s why i\'m one of the BEST GOLD RATED TUTORS in STUVIA. I assure a GOOD GRADE if you will use my work.

Read more Read less
4.6

545 reviews

5
409
4
81
3
30
2
18
1
7

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions