D431 / D 431 Final Exam (Latest Update 2025 / 2026) Digital Forensics in Cybersecurity | Study Guide & Vocab Questions and Answers | Grade A | 100% Correct (Verified Answers) - WGU
Question:
Virus
Answer:
Any software that self-replicates.
Question:
Visitor location register (VLR)
Answer:
A database used by the MSC for roaming phones.
- / 4
Question:
Volatile data
Answer:
Data that changes rapidly and may be lost when the machine that holds it is powered down.
Question:
Volatile memory
Answer:
Computer memory that requires power to maintain the data it holds, and can be changed. RAM is highly volatile; EEPROM is very nonvolatile.
Question:
Volatile memory analysis
Answer:
A live system forensic technique in which you collect a memory dump and perform analysis in an isolated environment.
- / 4
Question:
Zero-knowledge analysis
Answer:
A technique for file system repair that involves recovering data from a damaged partition with limited knowledge of the file system.
Question:
The Federal Privacy Act of 1974
Answer:
Establishes a code of information-handling practices that governs the collection, maintenance, use, and dissemination of information about individuals that is maintained in systems of records by U.S. federal agencies.A system of records is a group of records under the control of an agency from which information is retrieved by the name of the individual or by some identifier assigned to the individual.
Question:
The Communications Assistance to Law Enforcement Act of 1994 (CALEA)
Answer:
A federal wiretap law for traditional wired telephony. It was expanded in 2004 to include wireless, voice over packets, and other forms of electronic communications, including signaling traffic and metadata.
- / 4
Question:
The Privacy Protection Act of 1980
Answer:
Protects journalists from being required to turn over to law enforcement any work product and documentary materials, including sources, before it is disseminated to the public. Journalists who most need the protection of the PPA are those who are working on stories that are highly controversial or that describe criminal acts, because the information gathered may also be useful to law enforcement.
Question:
Unlawful Access to Stored Communications (18 U.S.C. § 2701)
Answer:
This act covers access to a facility through which electronic communication is provided or exceeding the access that was authorized. It is broadly written to apply to a range of offenses. Punishment can be up to 5 years in prison and fines for the first offense. The SCA governs how investigators can obtain stored account records and contents from network service providers, including Internet service providers ("ISPs"), telephone companies, and cell phone service providers. SCA issues arise often in cases involving the Internet: when investigators seek stored information concerning Internet accounts from providers of Internet service.
- / 4