WGU C840 Practice Assessment: Digital Forensics in Cybersecurity (2023/ 2024) Questions and Verified Answers| 100% Correct

WGU C840 Practice Assessment: Digital Forensics in Cybersecurity (2023/ 2024) Questions and Verified Answers| 100% Correct

WGU C840 Practice Assessment: Digital
Forensics in Cybersecurity (2023/ 2024)
Questions and Verified Answers| 100%
Correct
Q: Which Windows component is responsible for reading the boot.ini file and displaying the
boot loader menu on Windows XP during the boot process?
Answer:
NTLDR
Q: The following line of code is an example of how to make a forensic copy of a suspect drive:
dd if=/dev/mem of=/evidence/image.memory1
Which operating system should be used to run this command?
Answer:
Linux
Q: Which file system is supported by Mac?
Answer:
Hierarchical File System Plus (HFS+)
Q: Which law requires both parties to consent to the recording of a conversation?
Answer:
Electronic Communications Privacy Act (ECPA)

Q: Which law is related to the disclosure of personally identifiable protected health information
(PHI)?
Answer:
Health Insurance Portability and Accountability Act (HIPAA)
Q: Which U.S. law criminalizes the act of knowingly using a misleading domain name with the
intent to deceive a minor into viewing harmful material?
Answer:
18 U.S.C. 2252B
Q: Which U.S. law protects journalists from turning over their work or sources to law
enforcement before the information is shared with the public?
Answer:
The Privacy Protection Act (PPA)
Q: Which law or guideline lists the four states a mobile device can be in when data is extracted
from it?
Answer:
NIST SP 800-72 Guidelines
Q: Which law includes a provision permitting the wiretapping of VoIP calls?
Answer:
Communications Assistance to Law Enforcement Act (CALEA)

Q: Which policy is included in the CAN-SPAM Act?
Answer:
The email sender must provide some mechanism whereby the receiver can opt out of future
emails and that method cannot require the receiver to pay in order to opt out.
Q: Which United States law requires telecommunications equipment manufacturers to provide
built-in surveillance capabilities for federal agencies?
Answer:
Communication Assistance to Law Enforcement Act (CALEA)
Q: Which law requires a search warrant or one of the recognized expectations to the search
warrant requirements for searching email messages on a computer?
Answer:
The Fourth Amendment to the U.S. Constitution
Q: What is one purpose of steganography?
Answer:
To deliver information secretly
Q: Which method is used to implement steganography through pictures?
Answer:
LSB
Powered by https://learnexams.com/search/study?query=

Scroll to Top