WGU D431 digital forensics Exam with || || || || || ||
accurate detailed solutions || ||
Disk Forensics - ✔✔- the process of acquiring and analyzing information stored on a physical
|| || || || || || || || || || || || || || ||
storage media, such as computer hard drives , smartphones, GPS systems and removable media
|| || || || || || || || || || || || || ||
- includes both the recovery of hidden and deleted information and the process of identifying who
|| || || || || || || || || || || || || || || ||
created a file or message || || || ||
Email Forensics - ✔✔- the study of the source and content of email as evidence
|| || || || || || || || || || || || || || ||
- includes the process of identifying the sender, recipient, date, time and origination or
|| || || || || || || || || || || || || ||
unauthorized activities ||
Network Forensics - ✔✔- the process of examining network traffic, including transaction logs
|| || || || || || || || || || || || ||
and real time monitoring using sniffers and tracing
|| || || || || || ||
Internet forensics - ✔✔- the process of piecing together where and when a user has been on the
|| || || || || || || || || || || || || || || || || ||
Internet ||
- ex you can use to determine whether inappropriate Internet content access and downloading
|| || || || || || || || || || || || || ||
were accidental ||
Software forensics ( malware forensics) - ✔✔- the process of examining malicious computer
|| || || || || || || || || || || || ||
code
Live system forensics - ✔✔- the process of searching memory in real time , typically for working
|| || || || || || || || || || || || || || || || ||
with compromised hosts or to identify system abuse
|| || || || || || ||
, 2
Cell-phone forensics - ✔✔- the process of searching the contents of cell phones
|| || || || || || || || || || || ||
Daubert Standard - ✔✔- standard used by a trial judge to make a preliminary assessment of
|| || || || || || || || || || || || || || || ||
whether an expert's scientific testimony is based on reasoning or methodology that is
|| || || || || || || || || || || || ||
scientifically valid and can properly be applied to the facts at issue
|| || || || || || || || || || ||
The federal privacy act of 1974 - ✔✔- establishes a code of information handling practices that
|| || || || || || || || || || || || || || || ||
governs the collection, maintenance,use, and dissemination of information about individuals that
|| || || || || || || || || || ||
is maintained in systems of records by us federal agencies
|| || || || || || || || ||
System of record - ✔✔- a group of records under the control of an agency from which
|| || || || || || || || || || || || || || || || ||
information is retrieved by the name of the individual or by some identifier assigned to the
|| || || || || || || || || || || || || || || ||
individual
The privacy protection act of 1980 - ✔✔- protects journalists from being required to turn over to
|| || || || || || || || || || || || || || || || ||
law enforcement any work product and documentary materials, including sources, before it is
|| || || || || || || || || || || || ||
disseminated to the public || || || ||
- journalists who need this protection are those who are working on stories that are highly
|| || || || || || || || || || || || || || || ||
controversial or that describe criminal acts, because the info they gathered may also be useful to
|| || || || || || || || || || || || || || || ||
law enforcement
||
The communications assistance to law enforcement act of 1994 (CALEA) - ✔✔- a federal
|| || || || || || || || || || || || || ||
wiretap law for traditional wired telephony
|| || || || || ||
- expanded in 2004 to include wireless , Voice over packets and other forms of electronic
|| || || || || || || || || || || || || || || ||
communications including signaling traffic and metadata || || || || ||
Unlawful access to stored communications 18 U.S.C 2701 - ✔✔- covers access to a facility
|| || || || || || || || || || || || || || ||
through which electronic communication is provided or exceeding the access that was authorized
|| || || || || || || || || || || || ||