WGU C702 Pre-Assessment | Forensics and Network Intrusion Exam (Latest 2023/ 2024) Grade A Questions and Verified Answers| 100% Correct

WGU C702 Pre Assessment | Forensics and
Network Intrusion Exam (Latest 2023/ 2024)
Grade A Questions and Verified Answers|
100% Correct
Q: Which command line utility enables an investigator to analyze privileges assigned to
database files?
Answer:
mysqlaccess
Q: Which operating system contains PLIST files for forensic analysis?
Answer:
MacOS
Q: . Which web application weakness allows sensitive data to be unintentionally revealed to an
unauthorized user?
A. Broken access control
B. Information leakage
C. Buffer overflow
D. Improper error handling
Answer:
B. Information leakage
Q: . Which situation leads to a civil investigation?
A. Disputes between two parties that relate to a contract violation
B. Violations of laws that are considered to be harmful to society
C. Misconduct based on incorrectly following policies and procedures
D. Disagreement between business partners on communication protocols
Answer:
Disputes between two parties that relate to a contract violation
Q: . What is a benefit of forensic readiness?
A. Establishes procedures for fast and efficient investigations
B. Reduces the need for interface with law enforcement
C. Eliminates the need to follow regulatory requirements
D. Ensures maximum regulatory fines for data disclosure
Answer:
A. Establishes procedures for fast and efficient investigations
Q: . What should be considered when creating a forensic readiness plan?
A. Source of the evidence
B. Pertinence of the evidence
C. Problems that the evidence might cause in court
D. Determination of which evidence to include in the report
Answer:
A. Source of the evidence
Q: . Which rule does a forensic investigator need to follow?
A. Use only original evidence during analysis
B. Use well-known standard procedures
C. Discuss the case with the media
D. Include opinions with notes during analysis
Answer:
B. Use well-known standard procedures
Q: . What is the focus of Locard’s exchange principle?
A. Any action taken should avoid changing data held on a digital device.
B. Anyone entering a crime scene takes something with them and leaves something behind.
C. A record of all actions should be made so an independent investigator can verify results. D.
The investigator has the responsibility to follow the rules of evidence.
Answer:
B. Anyone entering a crime scene takes something with them and leaves something behind.
Q: . What is the focus of the enterprise theory of investigation (ETI)?
A. Criminals commit a crime solely for their own benefit.
B. Every crime should be investigated as an individual incident.
C. Forensics can be used to identify the threat actor in a crime.
D. Solving one crime can tie it back to a criminal organization’s activities.
Answer:
D. Solving one crime can tie it back to a criminal organization’s activities.
Q: . What allows for a lawful search to be conducted without a warrant or probable cause?
A. Imminent destruction of evidence
B. Initial search of the scene
C. Consent of person with authority
D. Obtained witness signatures
Answer:
C. Consent of person with authority
Q: . A forensic investigator is tasked with retrieving evidence where the primary server has
been erased. The investigator needs to rely on network logs and backup tapes to base their
conclusions on while testifying in court.
Which information found in rules of evidence, Rule 1001, helps determine if this testimony is
acceptable to the court?
A. Definition of original evidence
B. Requirements of original evidence
C. Admissibility of duplicate evidence
D. Admissibility of other evidence
Answer:
A. Definition of original evidence
Q: .When can a forensic investigator collect evidence without formal consent?
A. When properly worded banners are displayed on the computer screen
B. When the suspect is a minor and lives with parents or guardians
C. When devices are owned by a company and provisioned to its employees
D. When multiple people use the same equipment for daily work
Answer:
A. When properly worded banners are displayed on the computer screen
Q: . What do some states require before beginning a forensic investigation?
A. License
B. References
C. Indemnity insurance
D. Background check
Answer:
A. License
Q: . Which law protects customers’ sensitive data by requiring financial institutions to inform
their customers of their information-sharing practices?
A. Federal Information Security Modernization Act (FISMA)
B. General Data Protection Regulation (GDPR) C. Sarbanes-Oxley Act (SOX)
D. Gramm-Leach-Bliley Act (GLBA)
Answer:
D. Gramm-Leach-Bliley Act (GLBA)
Q: . Who determines whether a forensic investigation should take place if a situation is
undocumented in the standard operating procedures?
A. Decision maker
B. Attorney
Powered by https://learnexams.com/search/study?query=