Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU D431 - Digital Forensics in Cybersecurity (DQO1 vocab & study guide) Graded A+

Rating
-
Sold
-
Pages
83
Grade
A+
Uploaded on
08-11-2024
Written in
2024/2025

WGU D431 - Digital Forensics in Cybersecurity (DQO1 vocab & study guide) Graded A+

Institution
...
Course
...

Content preview

Name: Score:


229 Multiple choice questions

Definition 1 of 229
literally changes its form from time to time to avoid detection by antivirus software. A more
advanced form of this is called the Metamorphic virus; it can completely rewrite itself.

Polymorphic virus


Metamorphic virus

Macro virus

Armored virus

Definition 2 of 229
Protects children 13 years of age and under from the collection and use of their personal
information by websites. It replaces the Child Online Protection Act of 1988 (COPA), which was
determined to be unconstitutional.

The family educational rights and privacy act of 1974


The children's internet protection act of 2000

The Children's Online Privacy Protection Act of 1998


The digital millennium copyright act of 1998

Definition 3 of 229
A broad category of crime that can encompass many different activities, but essentially any
attempt to gain financial reward through deception.

Fraud


Identity Theft

Cyberstalking


Defamation

,Definition 4 of 229
This act covers access to a facility through which electronic communication is provided or
exceeding the access that was authorized. It is broadly written to apply to a range of offenses.
Punishment can be up to 5 years in prison and fines for the first offense. The SCA governs how
investigators can obtain stored account records and contents from network service providers,
including Internet service providers ("ISPs"), telephone companies, and cell phone service
providers. SCA issues arise often in cases involving the Internet: when investigators seek stored
information concerning Internet accounts from providers of Internet service.

Internet message access protocol (imap)

Disaster recovery plan (drp)


American standard code for information interchange (ascii)

Unlawful Access to Stored Communications (18 U.S.C. § 2701)

Term 5 of 229
What law applies to intercepting communications with the computer owner's permission?

A risk management approach to quantifying vulnerability data and then taking into account
the degree of risk to different types of systems or information.

Governs the privacy and disclosure, access, and interception of content and traffic data
related to electronic communications.

18 U.S.C. 2511 is the embodiment of the Electronic Communications Privacy Act (ECPA) of
1986 into criminal law. It is a crime to intentionally intercept, disclose, or use any wire, oral,
or electronic communication in violation of federal law.
This law applies to any person who is not a party to the communication and who
intentionally intercepts, discloses, or uses that communication without the consent of at
least one party.

Contains many provisions about recordkeeping and destruction of electronic records
relating to the management and operation of publicly held companies.

,Definition 6 of 229
The result of acquiring a file as it is being updated.

Caesar cipher

Symmetric cryptography

Slurred image


Swap file

Definition 7 of 229
attacks the computer in multiple ways—for example, infecting the boot sector of the hard disk and
one or more files.

Common virus


Worm

Boot-sector virus

Multi-partite virus

Definition 8 of 229
The last bit or least significant bit is used to store data.

Universal disk format (udf)

Asynchronous transfer mode (atm)

Least significant bit (LSB)


Base transceiver station (bts)

, Term 9 of 229
LILO (Linux Loader)

A command-line interface for linux.

One of the Linux boot loaders.

A graphical user Interface for linux.


A type of Linux file system.

Definition 10 of 229
The process of examining network traffic, including transaction logs and real-time monitoring.

Digital evidence

Expert testimony


Live system forensics

Network forensics

Definition 11 of 229
Offline analysis conducted on an evidence disk or forensic duplicate after booting from a CD or
another system.

Physical analysis

Logical analysis

Digital evidence

Volatile memory analysis

Written for

Institution
...
Course
...

Document information

Uploaded on
November 8, 2024
Number of pages
83
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$8.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
amzingnurse study smarts
Follow You need to be logged in order to follow users or courses
Sold
1561
Member since
2 year
Number of followers
63
Documents
3633
Last sold
13 hours ago

4.8

1569 reviews

5
1346
4
184
3
14
2
6
1
19

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions