Digital Forensics in Cybersecurity D431 Leave the first rating Students also studied Terms in this set (23) Science Computer Science Computer Security and Reliability Save
C840: Digital Forensics in Cybersec...
50 terms GBarriePreview Digital Forensics in Cybersecurity - ...43 terms mroliver22Preview WGU D431 - Digital Forensics in Cyb...229 terms infinitedrifterPreview WGU D 160 term Mo Which law requires both parties to consent to the recording of a conversation?Electronic Communications Privacy Act (ECPA) Which law is related to the disclosure of personally identifiable protected health information (PHI)?Health Insurance Portability and Accountability Act (HIPAA) Which U.S. law criminalizes the act of knowingly using a misleading domain name with the intent to deceive a minor into viewing harmful material?
18 U.S.C. 2252B
Which U.S. law protects journalists from turning over their work or sources to law enforcement before the information is shared with the public?The Privacy Protection Act (PPA) Which law or guideline lists the four states a mobile device can be in when data is extracted from it?NIST SP 800-72 Guidelines Which law includes a provision permitting the wiretapping of VoIP calls?Communications Assistance to Law Enforcement Act (CALEA Which policy is included in the CAN-SPAM Act? The email sender must provide some mechanism whereby the receiver can opt out of future emails and that method cannot require the receiver to pay in order to opt out.Which United States law requires telecommunications equipment manufacturers to provide built-in surveillance capabilities for federal agencies?Communication Assistance to Law Enforcement Act (CALEA)
Which law requires a search warrant or one of the recognized exceptions to the search warrant requirements for searching email messages on a computer?The Fourth Amendment to the U.S. Constitution During a cyber-forensics investigation, a USB drive was found that contained multiple pictures of the same flower.How should an investigator use properties of a file to detect steganography?Review the hexadecimal code looking for anomalies in the file headers and endings using a tool such as EnCase A system administrator believes data are being leaked from the organization. The administrator decides to use steganography to hide tracking information in the types of files he thinks are being leaked.Which steganographic term describes this tracking information?Payload Which Windows password cracking tool uses rainbow tables?Ophcrack Which activity involves email tracing?Determining the ownership of the source email server Which log or folder contains information about printed documents on a computer running Mac OS X?/var/spool/cups A cyber security organization has issued a warning about a cybercriminal who is using a known vulnerability to attack unpatched corporate Macintosh systems. A network administrator decides to examine the software updates logs on a Macintosh system to ensure the system has been patched.Which folder contains the software updates logs?/Library/Receipts A forensic investigator wants to image an older BlackBerry smartphone running OS 7.0.Which tool should the investigator use?BlackBerry Desktop Manager A police detective investigating a threat traces the source to a house. The couple at the house shows the detective the only computer the family owns, which is in their son's bedroom. The couple states that their son is presently in class at a local middle school.How should the detective legally gain access to the computer?Obtain consent to search from the parents
What are the three basic tasks that a systems forensic specialist must keep in mind when handling evidence during a cybercrime investigation?Answer options may be used more than once or not at all. Select your answers from the pull-down list.Find evidence, Preserve evidence, Prepare evidence Which file system is supported by Mac?Hierarchical File System Plus (HFS+) How does a rainbow table work to crack a password? It uses a table of all possible keyboard combinations and their hash values, then searches for a match.A criminal organization has compromised a third-party web server and is using it to control a botnet. The botnet server hides command and control messages through the DNS protocol.Which steganographic component are the command and control messages?Payload A system administrator believes an employee is leaking information to a competitor by hiding confidential data in images being attached to outgoing emails. The administrator has captured the outgoing emails.Which tool should the forensic investigator use to search for the hidden data in the images?Forensic Toolkit (FTK) During a cyber-forensics investigation, a USB drive was found that contained multiple pictures of the same flower.How should an investigator use properties of a file to detect steganography?Review the hexadecimal code looking for anomalies in the file headers and endings using a tool such as EnCase