Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the WGU Courses and Certificates Digital-Forensics-in-Cybersecurity Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam Digital-Forensics-in-Cybersecurity Premium Access

View all detail and faqs for the Digital-Forensics-in-Cybersecurity exam


437 Students Passed

87% Average Score

98% Same Questions
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which type of information does a Windows SAM file contain?

Options:

A.

Hash of network passwords

B.

Encrypted network passwords

C.

Hash of local Windows passwords

D.

Encrypted local Windows passwords

Questions # 2:

Which tool should be used with sound files, video files, and image files?

Options:

A.

Snow

B.

MP3Stego

C.

StegVideo

D.

Stealth Files 4

Questions # 3:

Which operating system creates a swap file to temporarily store information from memory on the hard drive when needed?

Options:

A.

Linux

B.

Mac

C.

Unix

D.

Windows

Questions # 4:

A forensic investigator needs to know which file type to look for in order to find emails from a specific client.

Which file extension is used by Eudora?

Options:

A.

.dbx

B.

.ost

C.

.pst

D.

.mbx

Questions # 5:

Which Windows 7 operating system log stores events collected from remote computers?

Options:

A.

System

B.

Application

C.

ForwardedEvents

D.

Security

Questions # 6:

A victim of Internet fraud fell for an online offer after using a search engine to find a deal on an expensive software purchase. Once the victim learned about the fraud, he contacted a forensic investigator for help.

Which digital evidence should the investigator collect?

Options:

A.

Virus signatures

B.

Whois records

C.

Computer logs

D.

Email headers

Questions # 7:

Which law is related to the disclosure of personally identifiable protected health information (PHI)?

Options:

A.

The Privacy Protection Act (PPA)

B.

Health Insurance Portability and Accountability Act (HIPAA)

C.

Electronic Communications Privacy Act (ECPA)

D.

Communications Assistance to Law Enforcement Act (CALEA)

Questions # 8:

What is a reason to use steganography?

Options:

A.

To save secret data

B.

To highlight secret data

C.

To erase secret data

D.

To delete secret data

Questions # 9:

An organization believes that a company-owned mobile phone has been compromised.

Which software should be used to collect an image of the phone as digital evidence?

Options:

A.

PTFinder

B.

Forensic SIM Cloner

C.

Forensic Toolkit (FTK)

D.

Data Doctor

Questions # 10:

What are the three basic tasks that a systems forensic specialist must keep in mind when handling evidence during a cybercrime investigation?

Options:

A.

Find evidence, preserve evidence, and prepare evidence

B.

Find evidence, analyze evidence, and prosecute evidence

C.

Preserve evidence, encrypt evidence, and delete evidence

D.

Analyze evidence, prepare evidence, and document evidence

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.