WGU C702 Objective Assessment | Forensics and Network Intrusion Exam (Latest 2023/ 2024) Grade A Questions and Verified Answers| 100% Correct

WGU C702 Objective Assessment | Forensics
and Network Intrusion Exam (Latest 2023/
2024) Grade A Questions and Verified
Answers| 100% Correct
Q: Forensic readiness includes technical and nontechnical actions that maximize an
organization’s competence to use digital evidence.
Answer:
True.
Q: Which of the following is the process of developing a strategy to address the occurrence of
any security breach in the system or network?
Answer:
Incident Response.
Q: Digital devices store data about session such as user and type of connection.
Answer:
True.
Q: Codes of ethics are the principles stated to describe the expected behavior of an investigator
while handling a case. Which of the following is NOT a principle that a computer forensic
investigator must follow?
Answer:
Provide personal or prejudiced opinions.
Q: What must an investigator do in order to offer a good report to a court of law and ease the
prosecution?
Answer:
Preserve the evidence.
Q: What is the role of an expert witness?
Answer:
To educate the public and court.
Q: Which of the following is NOT a legitimate authorizer of a search warrant?
Answer:
First Responder.
Q: Under which of the following circumstances has a court of law allowed investigators to
perform searches without a warrant?
Answer:
Delay in obtaining a warrant may lead to the destruction of evidence and hamper the
investigation process.
Q: Which of the following should be considered before planning and evaluating the budget for
the forensic investigation case?
Answer:
Breakdown of costs into daily and annual expenditure.
Q: Which of the following should be physical location and structural design considerations for
forensics labs?
Answer:
Lab exteriors should have no windows.
Q: Which of the following should be work area considerations for forensics labs?
Answer:
Examiner station has an area of about 50-63 square feet.
Q: Which of the following is NOT part of the Computer Forensics Investigation Methodology?
Answer:
Testify as an expert defendant.
Q: Which of the following is NOT part of the Computer Forensics Investigation Methodology?
Answer:
Destroy the evidence.
Q: Investigators can immediately take action after receiving a report of a security incident.
Answer:
False.
Q: In forensics laws, “authenticating or identifying evidences” comes under which rule?
Answer:
Rule 901.
Q: Courts call knowledgable persons to testify to the accuracy of the investigative process.
These people who tesify are known as the:
Answer:
Expert witnesses.
Q: A chain of custody is a critical document in the computer forensics investigation process
because the document provides legal validation of appropriate evidence handling.
Answer:
True.
Q: Identify the following which was launched by the National Institute of Standards and
Technology (NIST), that establishes a “methodology for testing computer forensics software
tools by development of general tool specifications, test procedures, test criteria, test sets, and
test hardware.”
Answer:
Computer Forensic Tool Testing Project (CFTTP)
Q: Which of the following is NOT a digital data storage type?
Answer:
Quantum storage devices.
Q: Which of the following is NOT a common computer file system?
Powered by https://learnexams.com/search/study?query=