Intrusion WGU Master's Course C702 - Forensics and
Network Intrusion 2025 UPDATE Verified Questions And
Answers | With 100% Correct Answers graded A+
Guaranteed Success!!
Terms in this set (475)
A software company suspects C
that employees have set up
automatic corporate email
forwarding to their
personal inboxes against
company policy. The company
hires forensic investigators to
identify the employees
violating policy, with the
intention of issuing warnings to
them.
Which type of cybercrime
investigation approach is this
company taking?
A Civil
B Criminal
C Administrative
D Punitive
,Which model or legislation A
applies a holistic approach
toward any criminal activity
as a criminal operation?
A Enterprise Theory of
Investigation
B Racketeer Influenced and
Corrupt Organizations Act
C Evidence Examination
D Law Enforcement Cyber
Incident Reporting
What does a forensic A
investigator need to obtain
before seizing a computing
device in a criminal case?
A Court warrant
B Completed crime report
C Chain of custody document
D Plaintiff's permission
Which activity should be used C
to check whether an
application has ever been
installed on a computer?
A Penetration test
B Risk analysis
C Log review
D Security review
Which characteristic describes an B
organization's forensic readiness
in the context of cybercrimes?
A It includes moral
considerations.
B It includes cost considerations.
C It excludes nontechnical actions.
D It excludes technical actions.
,A cybercrime investigator A
identifies a Universal Serial Bus
(USB) memory stick containing
emails as a primary piece of
evidence.
Who must sign the chain of
custody document once the
USB stick is in evidence?
A Those who obtain access to the
device
B Anyone who has ever used the
device
C Recipients of emails on the
device
D Authors of emails on the device
, Which type of attack is a denial- C
of-service technique that sends
a large amount of
data to overwhelm system
resources?
A Phishing
B Spamming
C Mail bombing
D Bluejacking
Which computer crime forensics B
step
requires an investigator to
duplicate and image the collected
digital information?
A Securing evidence
B Acquiring data
C Analyzing data
D Assessing evidence
What is the last step of a criminal B
investigation that requires the
involvement of a computer
forensic investigator?
A Analyzing the data collected
B Testifying in court
C Assessing the evidence
D Performing search and seizure
How can a forensic investigator C
verify an Android mobile device
is on, without
potentially changing the original
evidence or interacting with the
operating system?
A Check to see if it is
plugged into a computer
B Tap the screen multiple times
C Look for flashing lights