Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

Digital-Forensics-in-Cybersecurity WGU Digital Forensics in Cybersecurity (D431/C840) Course Exam Free Practice Exam Questions (2025 Updated)

Prepare effectively for your WGU Digital-Forensics-in-Cybersecurity Digital Forensics in Cybersecurity (D431/C840) Course Exam certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

A computer involved in a crime is infected with malware. The computer is on and connected to the company's network. The forensic investigator arrives at the scene.

Which action should be the investigator's first step?

A.

Turn off the computer

B.

Unplug the computer's Ethernet cable

C.

Run malware removal tools

D.

Copy files to external media

A forensic investigator is acquiring evidence from an iPhone.

What should the investigator ensure before the iPhone is connected to the computer?

A.

That the phone is in jailbreak mode

B.

That the phone avoids syncing with the computer

C.

That the phone is powered off

D.

That the phone has root privilege

What are the three basic tasks that a systems forensic specialist must keep in mind when handling evidence during a cybercrime investigation?

A.

Find evidence, preserve evidence, and prepare evidence

B.

Find evidence, analyze evidence, and prosecute evidence

C.

Preserve evidence, encrypt evidence, and delete evidence

D.

Analyze evidence, prepare evidence, and document evidence

After a company's single-purpose, dedicated messaging server is hacked by a cybercriminal, a forensics expert is hired to investigate the crime and collect evidence.

Which digital evidence should be collected?

A.

Server configuration files

B.

Firewall logs

C.

Email contents

D.

User login credentials

Susan was looking at her credit report and noticed that several new credit cards had been opened lately in her name. Susan has not opened any of the credit card accounts herself.

Which type of cybercrime has been perpetrated against Susan?

A.

Identity theft

B.

SQL injection

C.

Cyberstalking

D.

Malware

Which Windows 7 operating system log stores events collected from remote computers?

A.

System

B.

Application

C.

ForwardedEvents

D.

Security

A forensic scientist is examining a computer for possible evidence of a cybercrime.

Why should the forensic scientist copy files at the bit level instead of the OS level when copying files from the computer to a forensic computer?

A.

Copying files at the OS level fails to copy deleted files or slack space.

B.

Copying files at the OS level takes too long to be practical.

C.

Copying files at the OS level changes the timestamp of the files.

D.

Copying files at the OS level will copy extra information that is unnecessary.

The human resources manager of a small accounting firm believes he may have been a victim of a phishing scam. The manager clicked on a link in an email message that asked him to verify the logon credentials for the firm's online bank account.

Which digital evidence should a forensic investigator collect to investigate this incident?

A.

Email headers

B.

Browser cache

C.

System logs

D.

Network traffic logs

Which description applies to the Advanced Forensic Format (AFF)?

A.

An open file standard developed by AccessData

B.

A proprietary format used by the iLook tool

C.

An open file standard used by Sleuth Kit and Autopsy

D.

A proprietary format developed by Guidance Software

A forensics investigator is investigating a Windows computer which may be collecting data from other computers on the network.

Which Windows command line tool can be used to determine connections between machines?

A.

Telnet

B.

Xdetect

C.

Openfiles

D.

Netstat

Which file stores local Windows passwords in the Windows\System32\ directory and is subject to being cracked by using a live CD?

A.

SAM

B.

IPSec

C.

HAL

D.

Ntidr

Which characteristic applies to solid-state drives (SSDs) compared to magnetic drives?

A.

They are less susceptible to damage

B.

They have moving parts

C.

They are generally slower

D.

They have a lower cost per gigabyte

Which technique allows a cybercriminal to hide information?

A.

Steganalysis

B.

Steganography

C.

Encryption

D.

Cryptography

A cybercriminal communicates with his compatriots using steganography. The FBI discovers that the criminal group uses white space to hide data in photographs.

Which tool can the cybercriminals use to facilitate this type of communication?

A.

Steganophony

B.

Wolf

C.

Snow

D.

QuickStego

A digital forensic examiner receives a computer used in a hacking case. The examiner is asked to extract information from the computer's Registry.

How should the examiner proceed when obtaining the requested digital evidence?

A.

Ensure that any tools and techniques used are widely accepted

B.

Investigate whether the computer was properly seized

C.

Enlist a colleague to witness the investigative process

D.

Download a tool from a hacking website to extract the data

The chief information officer of an accounting firm believes sensitive data is being exposed on the local network.

Which tool should the IT staff use to gather digital evidence about this security vulnerability?

A.

Firewall

B.

Sniffer

C.

Antivirus

D.

Packet filter

Thomas received an email stating he needed to follow a link and verify his bank account information to ensure it was secure. Shortly after following the instructions, Thomas noticed money was missing from his account.

Which digital evidence should be considered to determine how Thomas' account information was compromised?

A.

Email messages

B.

Browser cache

C.

Bank transaction logs

D.

Firewall logs

Which characteristic applies to magnetic drives compared to solid-state drives (SSDs)?

A.

Higher cost

B.

Lower cost

C.

Less susceptible to damage

D.

Faster read/write speeds

Which tool should a forensic investigator use to determine whether data are leaving an organization through steganographic methods?

A.

Data Encryption Standard (DES)

B.

MP3Stego

C.

Netstat

D.

Forensic Toolkit (FTK)

Which storage format is a magnetic drive?

A.

CD-ROM

B.

SATA

C.

Blu-ray

D.

SSD

Copyright © 2014-2025 Solution2Pass. All Rights Reserved