WGU C840 with complete
verified solutions 2025
Which storage tech uses NAND?
SSD
What uses AFF file format?
Autopsy and Sleuth Kit
-Stands for Advance Forensic File Format
SQL Injection
An attack that targets SQL servers by injecting commands to be
manipulated by the database.
.odt format
Open Office File, often created with Apache OpenOffice Writer and
LibreOffice Writer
oracle database format
DD-MON-YY
Exchange File Format
SEF?
Eudora
.mbx
Which tool makes a bit-by-bit copy of a windows 8 phone?
Cellebrite's UFED
How to unlock an iPhone
XRY
Which tool can do a workflow check of steganography?
Quickstego or Invincible Secrets?
Data Doctor
This product recovers all Inbox and Outbox data and all contacts data, and
has an easy-to-use interface. Most important, it has a free trial version,
, but there is a cost for the full version. It is available from
http://www.simrestore.com/.
Whats /var/log/lpr?
Linux printer log
How does windows store pw?
Hash
Where does windows store pw?
SAM
Law for being able to collect GPS location?
The Wireless Communications and Public Safety Act of 1999.
Broadly, it allows for collection and use of "empty" communications
(nonverbal and nontext communications)
law for intercepting communications with computer owners permission
Where do deleted Apple iphone/ipad files go?
/.Trashes/501
Which type of data are the authorities allowed to get from service
providers?
subscriber information, metadata, and transactional data
CALEA
Comms Assistance for Law Enforcement Act- can tap lines if suspected of
criminal activity. Includes other forms of electronic communication,
including signaling traffic and metadata
COPPA
The Children's Online Privacy Protection Act of 1998 (COPPA) protects
children 13 years of age and under from the collection and use of their
personal information by websites. It is noteworthy that COPPA replaces
the Child Online Protection Act of 1988 (COPA), which was determined to
be unconstitutional.
CSA
The Computer Security Act of 1987 was passed to improve the security
and privacy of sensitive information in federal computer systems. The law
requires the establishment of minimum acceptable security practices,
creation of computer security plans, and training of system users or
owners of facilities that house sensitive information.
verified solutions 2025
Which storage tech uses NAND?
SSD
What uses AFF file format?
Autopsy and Sleuth Kit
-Stands for Advance Forensic File Format
SQL Injection
An attack that targets SQL servers by injecting commands to be
manipulated by the database.
.odt format
Open Office File, often created with Apache OpenOffice Writer and
LibreOffice Writer
oracle database format
DD-MON-YY
Exchange File Format
SEF?
Eudora
.mbx
Which tool makes a bit-by-bit copy of a windows 8 phone?
Cellebrite's UFED
How to unlock an iPhone
XRY
Which tool can do a workflow check of steganography?
Quickstego or Invincible Secrets?
Data Doctor
This product recovers all Inbox and Outbox data and all contacts data, and
has an easy-to-use interface. Most important, it has a free trial version,
, but there is a cost for the full version. It is available from
http://www.simrestore.com/.
Whats /var/log/lpr?
Linux printer log
How does windows store pw?
Hash
Where does windows store pw?
SAM
Law for being able to collect GPS location?
The Wireless Communications and Public Safety Act of 1999.
Broadly, it allows for collection and use of "empty" communications
(nonverbal and nontext communications)
law for intercepting communications with computer owners permission
Where do deleted Apple iphone/ipad files go?
/.Trashes/501
Which type of data are the authorities allowed to get from service
providers?
subscriber information, metadata, and transactional data
CALEA
Comms Assistance for Law Enforcement Act- can tap lines if suspected of
criminal activity. Includes other forms of electronic communication,
including signaling traffic and metadata
COPPA
The Children's Online Privacy Protection Act of 1998 (COPPA) protects
children 13 years of age and under from the collection and use of their
personal information by websites. It is noteworthy that COPPA replaces
the Child Online Protection Act of 1988 (COPA), which was determined to
be unconstitutional.
CSA
The Computer Security Act of 1987 was passed to improve the security
and privacy of sensitive information in federal computer systems. The law
requires the establishment of minimum acceptable security practices,
creation of computer security plans, and training of system users or
owners of facilities that house sensitive information.