WGU C840 Digital Forensics in Cybersecurity Exam Review (2023/ 2024 Update) Guide with Questions and Verified Answers| 100% Correct
WGU C840 Digital Forensics in
Cybersecurity Exam Review (2023/ 2024
Update) Guide with Questions and Verified
Answers| 100% Correct
Q: Sniffers are used to collect digital evidence. Which software package allows the user to map
out what ports are open on a target system and what services are running?
Answer:
Nmap
Q: Denial of service (DoS) attack does the attacker send fragments of packets with bad values
in them, causing the target system to crash when it tries to reassemble the fragments?
Answer:
Teardrop Attack
Q: denial of service (DoS) attack sends a tremendous number of ICMP packets to the target,
hoping to overwhelm it?
Answer:
Ping Flood
Q: Which port does POP3 Secure use for encrypted POP3?
Answer:
Port 995
Q: Which wireless standard obtains a bandwidth of 100 to 140 Mbps, operates at frequencies of
2.4 or 5.0 GHz, and has an indoor range of up to 230 feet?
Answer:
802.11n
Q: How long a system or systems be down before it is impossible for the organization to
recover.
Answer:
Maximum tolerable downtime (MTD)
Q: The basis of Moore’s Law found that the number of components in integrated circuits
doubled every __ and each doubling of capacity was done at half the cost.
Answer:
18 to 24 months
Q: takes snapshots of websites and saves them for posterity.
Answer:
The Wayback Machine
Q: Which certification is open only to law enforcement personnel and government employees
working as system forensics examiners?
Answer:
Certified Forensic Computer Examiner (CFCE)
Q: The manager clicked on a link in an email message that asked him to verify the logon
credentials for the firm’s online bank account.
Which digital evidence should a forensic investigator collect to investigate this incident?
Answer:
Browser cache
Q: Thomas received an email stating that he needed to follow a link and verify his bank account
information to ensure it was secure. Shortly after following the instructions, Thomas noticed
money was missing from his account.
Which digital evidence should be considered to determine how Thomas’ account information
was compromised?
Answer:
Email Messages
Q: A forensic scientist arrives at a crime scene to begin collecting evidence.
What is the first thing the forensic scientist should do?
Answer:
Photograph all evidence in its original place
Q: What are the three basic tasks that a systems forensic specialist must keep in mind when
handling evidence during a cybercrime investigation?
Answer:
1-Find Evidence
2-Preserve Evidence
3-Prepare Evidence
Q: Which characteristic applies to magnetic drives compared to solid-state drives (SSDs)?
Answer:
Lower Cost
Q: Which characteristic applies to solid-state drives (SSDs) compared to magnetic drives?
Answer:
They are less susceptible to damage
Q: Which type of storage format should be transported in a special bag to reduce electrostatic
interference?
Answer:
Magnetic Media
Q: Which Windows component is responsible for reading the boot.ini file and displaying the
boot loader menu on Windows XP during the boot process?
Answer:
NTLDR
Q: The following line of code is an example of how to make a forensic copy of a suspect drive:
dd if=/dev/mem of=/evidence/image.memory1
Which operating system should be used to run this command?
Answer:
LINUX
Powered by https://learnexams.com/search/study?query=