WGU C702 Forensics and Network Intrusion Final Exam (Latest 2023/ 2024) Graded A |Questions and Verified Answers| 100% Correct

WGU C702 Forensics and Network Intrusion Final Exam (Latest 2023/ 2024) Graded A |Questions and Verified Answers| 100% Correct

WGU C702 Forensics and Network Intrusion
Final Exam (Latest 2023/ 2024) Graded A
|Questions and Verified Answers| 100%
Correct
Q: What is 4DD hexadecimal notation in binary?
Answer:
10011011101
Q: A forensic investigator is using a hex editor to view file signatures for graphics. Which type
of file is the investigator viewing when the first hexadecimal characters are 42 4D?
Answer:
BMP
Q: What is the maximum compression ratio for JPEG files?
Answer:
90%
Q: Which software tool is designed strictly for maintaining the integrity of evidence during data
acquisition?
Answer:
SAFE Block

Q: Which media sanitization method does the NIST SP 800-88 recommend for making
recovery infeasible while still allowing the media to be reused?
Answer:
Purge
Q: What directly stores the deleted files from a Windows Vista machine?
Answer:
C:\$Recycle.Bin
Q: Where does MySQL store read-only tables and database-related data?
Answer:
Information schema
Q: Which file is the repository for records in MSSQL?
Answer:
Primary data file (MDF)
Q: A forensic investigator is collecting evidence from the MySQL server. The investigator
needs to verify the status of the tables and repair them using one of the MySQL utility programs.
Which utility program should the investigator use?
Answer:
myisamchk
Q: Which process studies system changes after multiple actions occur?

Answer:
Host integrity monitoring
Q: Which type of log-on event is created when a user logs on to a computer locally?
Answer:
Interactive
Q: A forensic investigator receives a virtual machine (VM) in a dd image file. Which program
should the investigator use to convert the dd image into a bootable VM?
Answer:
QEMU disk image utility
Q: A forensic investigator uses The Sleuth Kit (TSK) to extract information about when
directories were created and modified. Which command should the investigator use to extract the
information?
Answer:
fls
Q: Which log does an investigator analyze to determine when an external attacker first entered
a network?
Answer:
Firewall
Q: Which Windows event ID gets logged when a new process is started?
Powered by https://learnexams.com/search/study?query=

Scroll to Top