• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

Digital Forensics in Cybersecurity - D431

Latest WGU Jan 14, 2026 ★★★★☆ (4.0/5)
Loading...

Loading document viewer...

Page 0 of 0

Document Text

Digital Forensics in Cybersecurity - D431 5.0 (1 review) Students also studied Terms in this set (43) Western Governors UniversityD 431 Save WGU D431 - Digital Forensics in Cyb...229 terms infinitedrifterPreview WGU Course C840 - Digital Forensi...272 terms WieldyStone2 Preview Digital Forensics Overview and Key ...329 terms hedanielPreview C839v5 Teacher Sha Practice questions for this set Learn1 / 7Study using Learn Requires that telecommunications carriers and manufacturers of telecommunications equipment modify and design their equipment, facilities, and services to ensure that they have built-in surveillance capabilities, allowing federal agencies to monitor all telephone, broadband internet, and VoIP traffic in real time.Which storage tech uses NAND?SSD What uses AFF file format?Autopsy and Sleuth Kit Choose an answer 1Which storage tech uses NAND?2 The Communication Assistance to Law Enforcement Act (CALEA) 3Pwnage4How does windows store passwords?Don't know?

Data DoctorRecovers all inbox and outbox data and contacts data Linux Printer log location/var/log/lpr How does windows store passwords?SAM File Where does windows store passwords?Windows\System32 Does windows encrypt or hash the passwords? hash Where do deleted windows files go?Deleted from MFT or FAT Where do deleted MAC files go?Hidden folder /.Trash What file holds browser information after it's been deleted?index.dat Where do ipad/iphone deleted files go?/.Trashes/501 Slack spacespace between end of the file and the end of the cluster Pwnageunlock ipad touch APowerSoft and iMyPhonerecover deleted files from iphone Which type of data are the authorities allowed to get from service providers?Basic subscriber information, Transactional information, Content information, real- time access The Wireless Communications and Public Safety Act of 1999 Law to collect GPS location The Communication Assistance to Law Enforcement Act

(CALEA)

Requires that telecommunications carriers and manufacturers of telecommunications equipment modify and design their equipment, facilities, and services to ensure that they have built-in surveillance capabilities, allowing federal agencies to monitor all telephone, broadband internet, and VoIP traffic in real time.The Children's Online Privacy Protection Act of 1998

(COPPA)

Protects children 13 years of age and under from the collection and use of their personal information by websites. Replaces 1988 COPA The Computer Security Act of 1987 (CSA)Passed to improve the security and privacy of sensitive information in federal computer systems The Electronic Communications Privacy Act of 1986

(ECPA)

Governs the privacy and disclosure, access, and interception of content and traffic data related to electronic communications.18 U.S.C. 2252BLaw regarding misleading domains on Internet

The Fourth Amendment to the U.S. Constitution Consitutional requirement to have a search warrant to for search and seizure of electronic communications CAN-SPAM ActThe sender must provide some mechanism whereby the receiver can opt out of future emails and that method cannot require the receiver to pay in order to opt out.

Unlawful Access to Stored Communications: 18 U.S.C. §

2701 This act covers access to a facility through which electronic communication is provided or exceeding the access that was authorized.The Federal Privacy Act of 1974Regulates what personal information the Federal government can collect about private individuals The Privacy Protection Act of 1980protects journalists from being required to turn over to law enforcement any work product and documentary materials, including sources, before it is disseminated to the public.The Child Protection and Sexual Predator Punishment Act of 1998 Requires service providers that become aware of the storage or transmission of child pornography to report it to law enforcement.The Communications Decency Act of 1996Protect persons 18 years of age and under from downloading or viewing material considered indecent.The Sarbanes-Oxley Act of 2002established requirements for proper financial record keeping for public companies Host protected area (HPA)An area of a disk drive reserved for booting vendor utilities and diagnostic programs. It's not visible to the computer's OS.EnCaseForensic toolkit connected via ethernet or modem cable and prevents examiner from making any accidental changes.The Forensic Toolkit (FTK)Forensic toolkit good at cracking passwords and uses distributed processing.OSForensicsCheaper forensic toolkit Kali LinuxLinux Live CD, formerly known as BackTrack, includes a variety of tools HelixLinux Live CD used for computer forensics The Sleuth KitThe Sleuth Kit is a Unix and Windows based tool which helps in forensic analysis of computers.Disk InvestigatorThis tool runs on Windows and has a graphical user interface. It is not as full featured as EnCase or FTK, but it is free and very easy to use.Stealth Files 4Steganography tool which works with sound files, video files, and image files.QuickStegoSteganography tool, very easy to use but very limited.

Invisible SecretsSteganography tool, much more robust with both free and commercial versions MP3Stegohides a payload in MP3 files.StegVideohides data in a video sequence Deep Soundhides data in sound files.

User Reviews

★★★★☆ (4.0/5 based on 1 reviews)
Login to Review
S
Student
May 21, 2025
★★★★☆

This document featured in-depth analysis that was incredibly useful for my research. Such an excellent resource!

Download Document

Buy This Document

$11.00 One-time purchase
Buy Now
  • Full access to this document
  • Download anytime
  • No expiration

Document Information

Category: Latest WGU
Added: Jan 14, 2026
Description:

Digital Forensics in Cybersecurity - D431 5.0 (1 review) Students also studied Terms in this set Western Governors UniversityD 431 Save WGU D431 - Digital Forensics in Cyb... 229 terms infinitedrif...

Unlock Now
$ 11.00