Big Black Friday Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

Digital Forensics in Cybersecurity (D431/C840DQO1) Course Exam Question and Answers

Digital Forensics in Cybersecurity (D431/C840DQO1) Course Exam

Last Update Nov 30, 2025
Total Questions : 79

We are offering FREE Digital-Forensics-in-Cybersecurity WGU exam questions. All you do is to just go and sign up. Give your details, prepare Digital-Forensics-in-Cybersecurity free exam questions and then go for complete pool of Digital Forensics in Cybersecurity (D431/C840DQO1) Course Exam test questions that will help you more.

Digital-Forensics-in-Cybersecurity pdf

Digital-Forensics-in-Cybersecurity PDF

$36.75  $104.99
Digital-Forensics-in-Cybersecurity Engine

Digital-Forensics-in-Cybersecurity Testing Engine

$43.75  $124.99
Digital-Forensics-in-Cybersecurity PDF + Engine

Digital-Forensics-in-Cybersecurity PDF + Testing Engine

$57.75  $164.99
Questions 1

A forensic examiner is reviewing a laptop running OS X which has been compromised. The examiner wants to know if any shell commands were executed by any of the accounts.

Which log file or folder should be reviewed?

Options:

A.  

/var/vm

B.  

/Users//.bash_history

C.  

/var/log

D.  

/Users//Library/Preferences

Discussion 0
Questions 2

Which operating system (OS) uses the NTFS (New Technology File System) file operating system?

Options:

A.  

Linux

B.  

Mac OS X v10.5

C.  

Mac OS X v10.4

D.  

Windows 8

Discussion 0
Questions 3

A forensic investigator is acquiring evidence from an iPhone.

What should the investigator ensure before the iPhone is connected to the computer?

Options:

A.  

That the phone is in jailbreak mode

B.  

That the phone avoids syncing with the computer

C.  

That the phone is powered off

D.  

That the phone has root privilege

Discussion 0
Questions 4

A victim of Internet fraud fell for an online offer after using a search engine to find a deal on an expensive software purchase. Once the victim learned about the fraud, he contacted a forensic investigator for help.

Which digital evidence should the investigator collect?

Options:

A.  

Virus signatures

B.  

Whois records

C.  

Computer logs

D.  

Email headers

Discussion 0
Questions 5

Which U.S. law criminalizes the act of knowingly using a misleading domain name with the intent to deceive a minor into viewing harmful material?

Options:

A.  

Communications Assistance to Law Enforcement Act (CALEA)

B.  

18 U.S.C. 2252B

C.  

The Privacy Protection Act (PPA)

D.  

Electronic Communications Privacy Act (ECPA)

Discussion 0
Questions 6

Which rule is used for conducting electronic surveillance?

Options:

A.  

All documents related to health informatics should be stored in perpetuity.

B.  

All commercial email must provide an opt-out mechanism.

C.  

Using a misleading domain name to deceive a person into viewing obscene material shall result in fines or imprisonment.

D.  

Telecommunications equipment must have built-in surveillance capabilities for law enforcement.

Discussion 0
Questions 7

After a company's single-purpose, dedicated messaging server is hacked by a cybercriminal, a forensics expert is hired to investigate the crime and collect evidence.

Which digital evidence should be collected?

Options:

A.  

Server configuration files

B.  

Firewall logs

C.  

Email contents

D.  

User login credentials

Discussion 0
Questions 8

The following line of code is an example of how to make a forensic copy of a suspect drive:

dd if=/dev/mem of=/evidence/image.memory1

Which operating system should be used to run this command?

Options:

A.  

Windows

B.  

Linux

C.  

MacOS

D.  

Unix

Discussion 0
Questions 9

Where is the default location for 32-bit programs installed by a user on a 64-bit version of Windows 7?

Options:

A.  

C:\ProgramData

B.  

C:\Program files

C.  

C:\Windows

D.  

C:\Program files (x86)

Discussion 0
Questions 10

The chief information officer of an accounting firm believes sensitive data is being exposed on the local network.

Which tool should the IT staff use to gather digital evidence about this security vulnerability?

Options:

A.  

Firewall

B.  

Sniffer

C.  

Antivirus

D.  

Packet filter

Discussion 0
Questions 11

While collecting digital evidence from a running computer involved in a cybercrime, the forensic investigator makes a list of items that need to be collected.

Which piece of digital evidence should be collected first?

Options:

A.  

Security logs

B.  

Chat room logs

C.  

Recently accessed files

D.  

Temporary Internet files

Discussion 0
Questions 12

Which tool should be used with sound files, video files, and image files?

Options:

A.  

Snow

B.  

MP3Stego

C.  

StegVideo

D.  

Stealth Files 4

Discussion 0
Questions 13

Tom saved a message using the least significant bit (LSB) method in a sound file and uploaded this sound to his own website.

What is the carrier in this example?

Options:

A.  

The least significant bit method

B.  

Tom's website

C.  

The sound file

D.  

The message

Discussion 0
Questions 14

A forensic scientist is examining a computer for possible evidence of a cybercrime.

Why should the forensic scientist copy files at the bit level instead of the OS level when copying files from the computer to a forensic computer?

Options:

A.  

Copying files at the OS level fails to copy deleted files or slack space.

B.  

Copying files at the OS level takes too long to be practical.

C.  

Copying files at the OS level changes the timestamp of the files.

D.  

Copying files at the OS level will copy extra information that is unnecessary.

Discussion 0
Questions 15

Which characteristic applies to solid-state drives (SSDs) compared to magnetic drives?

Options:

A.  

They are less susceptible to damage

B.  

They have moving parts

C.  

They are generally slower

D.  

They have a lower cost per gigabyte

Discussion 0
Questions 16

A digital forensic examiner receives a computer used in a hacking case. The examiner is asked to extract information from the computer's Registry.

How should the examiner proceed when obtaining the requested digital evidence?

Options:

A.  

Ensure that any tools and techniques used are widely accepted

B.  

Investigate whether the computer was properly seized

C.  

Enlist a colleague to witness the investigative process

D.  

Download a tool from a hacking website to extract the data

Discussion 0
Questions 17

An organization has identified a system breach and has collected volatile data from the system.

Which evidence type should be collected next?

Options:

A.  

Running processes

B.  

Network connections

C.  

Temporary data

D.  

File timestamps

Discussion 0
Questions 18

Which description applies to the Advanced Forensic Format (AFF)?

Options:

A.  

An open file standard developed by AccessData

B.  

A proprietary format used by the iLook tool

C.  

An open file standard used by Sleuth Kit and Autopsy

D.  

A proprietary format developed by Guidance Software

Discussion 0
Questions 19

Thomas received an email stating he needed to follow a link and verify his bank account information to ensure it was secure. Shortly after following the instructions, Thomas noticed money was missing from his account.

Which digital evidence should be considered to determine how Thomas' account information was compromised?

Options:

A.  

Email messages

B.  

Browser cache

C.  

Bank transaction logs

D.  

Firewall logs

Discussion 0
Questions 20

Which directory contains the system's configuration files on a computer running Mac OS X?

Options:

A.  

/var

B.  

/bin

C.  

/etc

D.  

/cfg

Discussion 0
Questions 21

Which Windows component is responsible for reading the boot.ini file and displaying the boot loader menu on Windows XP during the boot process?

Options:

A.  

BOOTMGR

B.  

NTLDR

C.  

Winload.exe

D.  

BCD

Discussion 0
Questions 22

Which information is included in an email header?

Options:

A.  

Sender's MAC address

B.  

Number of pages

C.  

Content-Type

D.  

Message-Digest

Discussion 0
Questions 23

What is one purpose of steganography?

Options:

A.  

To encrypt data for security

B.  

To deliver information secretly

C.  

To compress large files

D.  

To delete files securely

Discussion 0