{"id":119731,"date":"2023-09-14T11:03:47","date_gmt":"2023-09-14T11:03:47","guid":{"rendered":"https:\/\/learnexams.com\/blog\/?p=119731"},"modified":"2023-09-14T11:03:48","modified_gmt":"2023-09-14T11:03:48","slug":"wgu-c840-exams-pre-assessment-practice-assessment-digital-forensics-in-cybersecurity-2023-2024-updates-study-pack-real-questions-and-verified-answers-grade-a","status":"publish","type":"post","link":"https:\/\/www.learnexams.com\/blog\/2023\/09\/14\/wgu-c840-exams-pre-assessment-practice-assessment-digital-forensics-in-cybersecurity-2023-2024-updates-study-pack-real-questions-and-verified-answers-grade-a\/","title":{"rendered":"WGU C840 Exams.Pre-Assessment.Practice Assessment: Digital Forensics in Cybersecurity (2023\/ 2024 UPDATES STUDY PACK) Real Questions and Verified Answers| Grade A"},"content":{"rendered":"\n<p>WGU C840 Digital Forensics in<br>Cybersecurity Exam Review (2023\/ 2024<br>Update) Guide with Questions and Verified<br>Answers| 100% Correct<br>Q: Sniffers are used to collect digital evidence. Which software package allows the user to map<br>out what ports are open on a target system and what services are running?<br>Answer:<br>Nmap<br>Q: Denial of service (DoS) attack does the attacker send fragments of packets with bad values<br>in them, causing the target system to crash when it tries to reassemble the fragments?<br>Answer:<br>Teardrop Attack<br>Q: denial of service (DoS) attack sends a tremendous number of ICMP packets to the target,<br>hoping to overwhelm it?<br>Answer:<br>Ping Flood<br>Q: Which port does POP3 Secure use for encrypted POP3?<br>Answer:<br>Port 995<\/p>\n\n\n\n<p>Q: Which wireless standard obtains a bandwidth of 100 to 140 Mbps, operates at frequencies of<br>2.4 or 5.0 GHz, and has an indoor range of up to 230 feet?<br>Answer:<br>802.11n<br>Q: How long a system or systems be down before it is impossible for the organization to<br>recover.<br>Answer:<br>Maximum tolerable downtime (MTD)<br>Q: The basis of Moore&#8217;s Law found that the number of components in integrated circuits<br>doubled every <strong><em>__<\/em><\/strong> and each doubling of capacity was done at half the cost.<br>Answer:<br>18 to 24 months<br>Q: takes snapshots of websites and saves them for posterity.<br>Answer:<br>The Wayback Machine<br>Q: Which certification is open only to law enforcement personnel and government employees<br>working as system forensics examiners?<br>Answer:<br>Certified Forensic Computer Examiner (CFCE)<\/p>\n\n\n\n<p>Q: The manager clicked on a link in an email message that asked him to verify the logon<br>credentials for the firm&#8217;s online bank account.<br>Which digital evidence should a forensic investigator collect to investigate this incident?<br>Answer:<br>Browser cache<br>Q: Thomas received an email stating that he needed to follow a link and verify his bank account<br>information to ensure it was secure. Shortly after following the instructions, Thomas noticed<br>money was missing from his account.<br>Which digital evidence should be considered to determine how Thomas&#8217; account information<br>was compromised?<br>Answer:<br>Email Messages<br>Q: A forensic scientist arrives at a crime scene to begin collecting evidence.<br>What is the first thing the forensic scientist should do?<br>Answer:<br>Photograph all evidence in its original place<br>Q: What are the three basic tasks that a systems forensic specialist must keep in mind when<br>handling evidence during a cybercrime investigation?<br>Answer:<br>1-Find Evidence<br>2-Preserve Evidence<br>3-Prepare Evidence<\/p>\n\n\n\n<p>Q: Which characteristic applies to magnetic drives compared to solid-state drives (SSDs)?<br>Answer:<br>Lower Cost<br>Q: Which characteristic applies to solid-state drives (SSDs) compared to magnetic drives?<br>Answer:<br>They are less susceptible to damage<br>Q: Which type of storage format should be transported in a special bag to reduce electrostatic<br>interference?<br>Answer:<br>Magnetic Media<br>Q: Which Windows component is responsible for reading the boot.ini file and displaying the<br>boot loader menu on Windows XP during the boot process?<br>Answer:<br>NTLDR<br>Q: The following line of code is an example of how to make a forensic copy of a suspect drive:<br>dd if=\/dev\/mem of=\/evidence\/image.memory1<br>Which operating system should be used to run this command?<br>Answer:<br>LINUX<\/p>\n\n\n\n<p>WGU C840 Digital Forensics in<br>Cybersecurity Exam (2023\/ 2024 Update)<br>Questions and Verified Answers| 100%<br>Correct<br>Q: Which log or folder contains information about printed documents on a computer running<br>Mac OS X?<br>A. \/var\/log\/lpr.log<br>B. \/var\/spool\/cups<br>C. \/var\/vm<br>D. \/var\/log<br>Answer:<br>B.<br>Q: Which Windows event log should be checked for evidence of invalid logon attempts?<br>A. Application<br>B. Security<br>C. ForwardedEvents<br>D. System<br>Answer:<br>B.<br>Q: A cyber security organization has issued a warning about a cybercriminal who is using a<br>known vulnerability to attack unpatched corporate Macintosh systems. A network administrator<br>decides to examine the software updates logs on a Macintosh system to ensure the system has<br>been patched.<br>Which folder contains the software updates logs?<br>A. \/var\/spool\/cups<br>B. \/var\/log<br>C. \/proc<\/p>\n\n\n\n<p>D. \/Library\/Receipts<br>Answer:<br>C.<br>Q: A forensic investigator wants to image an older BlackBerry smartphone running OS 7.0.<br>Which tool should the investigator use?<br>A. CopyQM Plus<br>B. BlackBerry Extractor<br>C. The Sleuth Kit<br>D. BlackBerry Desktop Manager<br>Answer:<br>C.<br>Q: An investigator wants to extract information from a mobile device by connecting it to a<br>computer.<br>What should the investigator take great care to ensure?<br>A. That proper step information is written to the mobile device<br>B. That the mobile device is updated with the latest operating system<br>C. That current time stamps of forensics activities are written to the device<br>D. That the mobile device does not synchronize with the computer<br>Answer:<br>C.<br>Q: Which state is a device in if it is powered on, performing tasks, and able to be manipulated<br>by the user?<br>A. Guest-mode<br>B. Nascent<br>C. Quiescent<br>D. Active<\/p>\n\n\n\n<p>Answer:<br>C.<br>Q: Rules of evidence can be defined as <strong><em><strong><em>_<\/em><\/strong>.<br>A. term that refers to how long evidence will last<br>B. formal document prepared by a forensics specialist to document an investigation, including a<br>list of all tests conducted as well as the specialist&#8217;s own curriculum vitae (CV)<br>C. rules that govern whether, when, how, and why proof of a legal case can be placed before a<br>judge or jury<br>D. information that has been processed and assembled so that it is relevant to an investigation<br>and supports a specific finding or determination<br>Answer:<br>C.<br>Q: The Windows Registry is organized into five sections. The <strong><em>_<\/em><\/strong><\/em><\/strong> section contains<br>those settings common to the entire machine, regardless of the individual user.<br>A. HKEY_CURRENT_USER (HKCU)<br>B. HKEY_CLASSES_ROOT (HKCR)<br>C. HKEY_LOCAL_MACHINE (HKLM)<br>D. HKEY_USERS (HKU)<br>Answer:<br>C.<br>Q: There are specific laws in the United States that are applicable to e-mail investigations.<br><strong><em>__<\/em><\/strong> is a U.S. law that prescribes procedures for the physical and electronic surveillance<br>and collection of &#8220;foreign intelligence information&#8221; between foreign powers and agents of<br>foreign powers, which may include American citizens and permanent residents suspected of<br>espionage or terrorism.<br>A. The Electronic Communications Privacy Act (ECPA)<br>B. The USA Patriot Act<br>C. Foreign Intelligence Surveillance Act (FISA)<br>D. 18 U.S.C. 2252B<br>Answer:<\/p>\n\n\n\n<p>C.<br>Q: Identification, preservation, collection, examination, analysis, and presentation are six<br>classes in the matrix of <strong><em><strong><em>_<\/em><\/strong>.<br>A. the Rules of Evidence<br>B. the DFRWS framework<br>C. the Forensic Toolkit<br>D. the Certified-Forensic-Analyst<br>Answer:<br>B.<br>Q: One of the first steps in any forensic examination should be to check the logs. If you need to<br>know what documents have been printed from the Macintosh, the <strong><em>_<\/em><\/strong><\/em><\/strong> folder can give<br>you that information.<br>A. \/Library\/Receipts<br>B. \/Users\/\/.bash_history log<br>C. var\/vm<br>D. \/var\/spool\/cups<br>Answer:<br>C.<br>Q: What name is given to the result of acquiring a file as it is being updated?<br>A. slurred image<br>B. master boot record (MBR)<br>C. hive<br>D. dump<br>Answer:<br>A.<br>Q: At which phase of the incident response does computer forensics begin?<br>A. follow-up<\/p>\n\n\n\n<p>WGU C840 Digital Forensics in<br>Cybersecurity Final Exam (2023\/ 2024<br>Update) Questions and Verified Answers|<br>100% Correct<br>Q: If a camera is available and the computer is on<br>Answer:<br>Take pics of the screen, if its off take pics of the pc, the location, and any electronic media<br>attached<br>Q: The SAM file is found<br>Answer:<br>Windows\/System32 directory<br>Q: What contains every conceivable combination of keyboard characters under the rainbow and<br>their associated hashed versions<br>Answer:<br>Rainbow table<br>Q: What prohibits the use of telecommunications to annoy, abuse, threaten or harass anyone?<br>Answer:<br>Title 47 of U.S Code 223<\/p>\n\n\n\n<p>Q: The first step in any investigation is to<br>Answer:<br>Make a copy of the suspected storage device. (Bit-level copy)<br>Q: EnCase, Forensic Toolkit, and OSForensics can be used to<br>Answer:<br>Make bit-level copies of hard drives (ideally two copies)<br>Q: What three main technical data collection considerations must be kept in mind?<br>Answer:<br>Understanding the life span of information, collecting information quickly, and collecting bitlevel information<br>Q: Life span in forensics refers to<br>Answer:<br>How long information is valid<br>Q: What enables an investigator to reconstruct file fragments if files have been deleted or<br>overwritten?<br>Answer:<br>Bit-level tools<br>Q: What sets standards for digital evidence processing, analysis, and diagnostics?<\/p>\n\n\n\n<p>Answer:<br>The DoD Cyber Crime Center (DC3)<br>Q: The three basic tasks of handling evidence are<br>Answer:<br>Find, preserve and prepare evidence<br>Q: A server for used for storage should have a minimum of<br>Answer:<br>RAID 1 (Disk mirroring) but RAID 5 is recommended<br>Q: What customized Linux Live CD is used for computer forensics?<br>Answer:<br>Helix<br>Q: BackTrack is now known as<br>Answer:<br>Kali Linux<br>Q: What is AnaDisk?<br>Answer:<br>A tool that turns a PC into a sophisticated disk analysis tool<\/p>\n\n\n\n<p>WGU C840 Pre-Assessment: Digital<br>Forensics in Cybersecurity (2023\/ 2024)<br>Actual Questions and Verified Answers|<br>Grade A<br>Q: What are the three basic tasks that a systems forensic specialist must keep in mind when<br>handling evidence during a cybercrime investigation?<br>Answer:<br>Find evidence, Preserve evidence, and Prepare evidence<br>Q: How do forensic specialists show that digital evidence was handled in a protected, secure<br>manner during the process of collecting and analyzing the evidence?<br>Answer:<br>Chain of custody<br>Q: Which characteristic applies to magnetic drives compared to solid-state drives (SSDs)?<br>Answer:<br>Lower cost<br>Q: Which characteristic applies to solid-state drives (SSDs) compared to magnetic drives?<br>Answer:<br>They are less susceptible to damage.<\/p>\n\n\n\n<p>Q: Which type of storage format should be transported in a special bag to reduce electrostatic<br>interference?<br>Answer:<br>Magnetic media<br>Q: Which Windows component is responsible for reading the boot.ini file and displaying the<br>boot loader menu on Windows XP during the boot process?<br>Answer:<br>NTLDR<br>Q: The following line of code is an example of how to make a forensic copy of a suspect drive:<br>dd if=\/dev\/mem of=\/evidence\/image.memory1<br>Which operating system should be used to run this command?<br>Answer:<br>Linux<br>Q: Which file system is supported by Mac?<br>Answer:<br>Hierarchical File System Plus (HFS+)<br>Q: Which law requires both parties to consent to the recording of a conversation?<br>Answer:<br>Electronic Communications Privacy Act (ECPA)<\/p>\n\n\n\n<p>WGU C840 Practice Assessment: Digital<br>Forensics in Cybersecurity (2023\/ 2024)<br>Questions and Verified Answers| 100%<br>Correct<br>Q: Which Windows component is responsible for reading the boot.ini file and displaying the<br>boot loader menu on Windows XP during the boot process?<br>Answer:<br>NTLDR<br>Q: The following line of code is an example of how to make a forensic copy of a suspect drive:<br>dd if=\/dev\/mem of=\/evidence\/image.memory1<br>Which operating system should be used to run this command?<br>Answer:<br>Linux<br>Q: Which file system is supported by Mac?<br>Answer:<br>Hierarchical File System Plus (HFS+)<br>Q: Which law requires both parties to consent to the recording of a conversation?<br>Answer:<br>Electronic Communications Privacy Act (ECPA)<\/p>\n\n\n\n<p>Q: Which law is related to the disclosure of personally identifiable protected health information<br>(PHI)?<br>Answer:<br>Health Insurance Portability and Accountability Act (HIPAA)<br>Q: Which U.S. law criminalizes the act of knowingly using a misleading domain name with the<br>intent to deceive a minor into viewing harmful material?<br>Answer:<br>18 U.S.C. 2252B<br>Q: Which U.S. law protects journalists from turning over their work or sources to law<br>enforcement before the information is shared with the public?<br>Answer:<br>The Privacy Protection Act (PPA)<br>Q: Which law or guideline lists the four states a mobile device can be in when data is extracted<br>from it?<br>Answer:<br>NIST SP 800-72 Guidelines<br>Q: Which law includes a provision permitting the wiretapping of VoIP calls?<br>Answer:<br>Communications Assistance to Law Enforcement Act (CALEA)<\/p>\n\n\n\n<p>Q: Which policy is included in the CAN-SPAM Act?<br>Answer:<br>The email sender must provide some mechanism whereby the receiver can opt out of future<br>emails and that method cannot require the receiver to pay in order to opt out.<br>Q: Which United States law requires telecommunications equipment manufacturers to provide<br>built-in surveillance capabilities for federal agencies?<br>Answer:<br>Communication Assistance to Law Enforcement Act (CALEA)<br>Q: Which law requires a search warrant or one of the recognized expectations to the search<br>warrant requirements for searching email messages on a computer?<br>Answer:<br>The Fourth Amendment to the U.S. Constitution<br>Q: What is one purpose of steganography?<br>Answer:<br>To deliver information secretly<br>Q: Which method is used to implement steganography through pictures?<br>Answer:<br>LSB<\/p>\n","protected":false},"excerpt":{"rendered":"<p>WGU C840 Digital Forensics inCybersecurity Exam Review (2023\/ 2024Update) Guide with Questions and VerifiedAnswers| 100% CorrectQ: Sniffers are used to collect digital evidence. Which software package allows the user to mapout what ports are open on a target system and what services are running?Answer:NmapQ: Denial of service (DoS) attack does the attacker send fragments of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[25],"tags":[],"class_list":["post-119731","post","type-post","status-publish","format-standard","hentry","category-exams-certification"],"_links":{"self":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/119731","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/comments?post=119731"}],"version-history":[{"count":0,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/119731\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/media?parent=119731"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/categories?post=119731"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/tags?post=119731"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}