Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

Digital-Forensics-in-Cybersecurity WGU Digital Forensics in Cybersecurity (D431/C840DQO1) Course Exam Free Practice Exam Questions (2025 Updated)

Prepare effectively for your WGU Digital-Forensics-in-Cybersecurity Digital Forensics in Cybersecurity (D431/C840DQO1) Course Exam certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Which United States law requires telecommunications equipment manufacturers to provide built-in surveillance capabilities for federal agencies?

A.

Health Insurance Portability and Accountability Act (HIPAA)

B.

Communications Assistance to Law Enforcement Act (CALEA)

C.

Electronic Communications Privacy Act (ECPA)

D.

The Privacy Protection Act (PPA)

Which universal principle must be observed when handling digital evidence?

A.

Avoid making changes to the evidence

B.

Make a copy and analyze the original

C.

Get the signatures of two witnesses

D.

Keep the evidence in a plastic bag

Which forensics tool can be used to bypass the passcode of an Apple iPhone running the iOS operating system?

A.

iStumbler

B.

Ophcrack

C.

LOphtCrack

D.

XRY

Which information is included in an email header?

A.

Sender's MAC address

B.

Number of pages

C.

Content-Type

D.

Message-Digest

How do forensic specialists show that digital evidence was handled in a protected, secure manner during the process of collecting and analyzing the evidence?

A.

By encrypting all evidence

B.

By maintaining the chain of custody

C.

By deleting temporary files

D.

By performing backups

An employee sends an email message to a fellow employee. The message is sent through the company's messaging server.

Which protocol is used to send the email message?

A.

SNMP

B.

IMAP

C.

POP3

D.

SMTP

Which storage format is a magnetic drive?

A.

CD-ROM

B.

SATA

C.

Blu-ray

D.

SSD

Which law or guideline lists the four states a mobile device can be in when data is extracted from it?

A.

Health Insurance Portability and Accountability Act (HIPAA)

B.

NIST SP 800-72 Guidelines

C.

Electronic Communications Privacy Act (ECPA)

D.

Communications Assistance to Law Enforcement Act (CALEA)

Which principle of evidence collection states that access to evidence must be tracked from the time it is seized through its use in court?

A.

Evidence record

B.

Chain of custody

C.

Event log

D.

Audit log

Which file system is supported by Mac?

A.

NTFS

B.

EXT4

C.

Hierarchical File System Plus (HFS+)

D.

FAT32

Which law requires both parties to consent to the recording of a conversation?

A.

Health Insurance Portability and Accountability Act (HIPAA)

B.

Electronic Communications Privacy Act (ECPA)

C.

Wiretap Act

D.

Stored Communications Act

A forensic investigator suspects that spyware has been installed to a Mac OS X computer by way of an update.

Which Mac OS X log or folder stores information about system and software updates?

A.

/var/spool/cups

B.

/var/log/daily.out

C.

/var/vm

D.

/Library/Receipts

The following line of code is an example of how to make a forensic copy of a suspect drive:

dd if=/dev/mem of=/evidence/image.memory1

Which operating system should be used to run this command?

A.

Windows

B.

Linux

C.

MacOS

D.

Unix

A forensic investigator needs to know which file type to look for in order to find emails from a specific client.

Which file extension is used by Eudora?

A.

.dbx

B.

.ost

C.

.pst

D.

.mbx

What are the three basic tasks that a systems forensic specialist must keep in mind when handling evidence during a cybercrime investigation?

A.

Find evidence, preserve evidence, and prepare evidence

B.

Find evidence, analyze evidence, and prosecute evidence

C.

Preserve evidence, encrypt evidence, and delete evidence

D.

Analyze evidence, prepare evidence, and document evidence

Which U.S. law protects journalists from turning over their work or sources to law enforcement before the information is shared with the public?

A.

The Privacy Protection Act (PPA)

B.

Health Insurance Portability and Accountability Act (HIPAA)

C.

Electronic Communications Privacy Act (ECPA)

D.

Communications Assistance to Law Enforcement Act (CALEA)

A forensic scientist arrives at a crime scene to begin collecting evidence.

What is the first thing the forensic scientist should do?

A.

Seize the computer immediately

B.

Photograph all evidence in its original place

C.

Document user passwords

D.

Run antivirus scans

A forensic investigator is acquiring evidence from an iPhone.

What should the investigator ensure before the iPhone is connected to the computer?

A.

That the phone is in jailbreak mode

B.

That the phone avoids syncing with the computer

C.

That the phone is powered off

D.

That the phone has root privilege

Susan was looking at her credit report and noticed that several new credit cards had been opened lately in her name. Susan has not opened any of the credit card accounts herself.

Which type of cybercrime has been perpetrated against Susan?

A.

Identity theft

B.

SQL injection

C.

Cyberstalking

D.

Malware

A police detective investigating a threat traces the source to a house. The couple at the house shows the detective the only computer the family owns, which is in their son's bedroom. The couple states that their son is presently in class at a local middle school.

How should the detective legally gain access to the computer?

A.

Obtain consent to search from the parents

B.

Wait for the son to return and ask for consent

C.

Search immediately without consent due to emergency

D.

Get a warrant without consent

Copyright © 2014-2025 Solution2Pass. All Rights Reserved