C202 Pre-Assessment Review All 70 Questions With
100% Correct Answers Graded A WGU/ C202 Human
Capital Pre-Assessment Exam Review (Latest!)
An attack that sends a large amount of data to overwhelm
system resources. - ...ANSWER...✓✓ Denial-of-service
technique
A type of denial-of-service attack that involves sending a
large volume of emails to a target. - ...ANSWER...✓✓ Mail
bombing
The step in computer crime forensics where an
investigator duplicates and images the collected digital
information. - ...ANSWER...✓✓ Acquiring data
The last step of a criminal investigation that requires the
involvement of a computer forensic investigator. -
...ANSWER...✓✓ Testifying in court
Checking to see if it is plugged into a computer without
potentially changing the original evidence. -
...ANSWER...✓✓ Verifying an Android mobile device
,2|Page
An alternative material a forensic investigator can use to
protect a mobile device if a Faraday bag is not available. -
...ANSWER...✓✓ Aluminum foil
The criterion that determines whether a technology used
by government to obtain information in a computer
search is considered innovative and requires a search
warrant. - ...ANSWER...✓✓ Availability to the general
public
A situation that allows a law enforcement officer to seize
a hard drive from a residence without obtaining a search
warrant. - ...ANSWER...✓✓ Imminent danger
A legal document that contains a summary of findings and
is used to prosecute. - ...ANSWER...✓✓ Investigation
report
A protective bag used to prevent any signals from
reaching a mobile phone. - ...ANSWER...✓✓ Faraday bag
,3|Page
An ethical behavior for a forensic investigator while
testifying in court. - ...ANSWER...✓✓ Providing and
explaining facts
What a government agent should have complied with
during a case involving malware on a system. -
...ANSWER...✓✓ Search and seizure compliance
A part of the United States Constitution that protects
citizens from unreasonable searches and seizures. -
...ANSWER...✓✓ Fourth Amendment
A law that governs the voluntary and compelled
disclosure of stored wire and electronic communications
and transactional records. - ...ANSWER...✓✓ Stored
Communications Act
Legislation that aims to ensure all internet traffic is
treated equally without discrimination or charging
differently. - ...ANSWER...✓✓ Net Neutrality Bill
, 4|Page
Rules that govern the introduction of evidence at civil and
criminal trials in United States federal trial courts. -
...ANSWER...✓✓ Federal Rules of Evidence
A method where the investigator only has access to the
stego object and no plaintext. - ...ANSWER...✓✓ Stego-
only
A method where the investigator knows the stego object
but not the plaintext. - ...ANSWER...✓✓ Known-stego
A method where the investigator has access to the
plaintext message and uses it to find the hidden
information. - ...ANSWER...✓✓ Known-message
A method where the investigator selects a plaintext
message to analyze and find the algorithm used to hide
information. - ...ANSWER...✓✓ Chosen-message
An operating system developed by Apple Inc. for
Macintosh computers. - ...ANSWER...✓✓ OS X