Summer Special Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 713PS592

Digital-Forensics-in-Cybersecurity Digital Forensics in Cybersecurity (D431/C840) Course Exam Questions and Answers

Questions 4

Which operating system (OS) uses the NTFS (New Technology File System) file operating system?

Options:

A.

Linux

B.

Mac OS X v10.5

C.

Mac OS X v10.4

D.

Windows 8

Buy Now
Questions 5

Tom saved a message using the least significant bit (LSB) method in a sound file and uploaded this sound to his own website.

What is the carrier in this example?

Options:

A.

The least significant bit method

B.

Tom's website

C.

The sound file

D.

The message

Buy Now
Questions 6

Which principle of evidence collection states that access to evidence must be tracked from the time it is seized through its use in court?

Options:

A.

Evidence record

B.

Chain of custody

C.

Event log

D.

Audit log

Buy Now
Questions 7

The human resources manager of a small accounting firm believes he may have been a victim of a phishing scam. The manager clicked on a link in an email message that asked him to verify the logon credentials for the firm's online bank account.

Which digital evidence should a forensic investigator collect to investigate this incident?

Options:

A.

Email headers

B.

Browser cache

C.

System logs

D.

Network traffic logs

Buy Now
Questions 8

A forensic investigator needs to know which file type to look for in order to find emails from a specific client.

Which file extension is used by Eudora?

Options:

A.

.dbx

B.

.ost

C.

.pst

D.

.mbx

Buy Now
Questions 9

A forensic scientist arrives at a crime scene to begin collecting evidence.

What is the first thing the forensic scientist should do?

Options:

A.

Seize the computer immediately

B.

Photograph all evidence in its original place

C.

Document user passwords

D.

Run antivirus scans

Buy Now
Questions 10

Which tool should a forensic investigator use to determine whether data are leaving an organization through steganographic methods?

Options:

A.

Data Encryption Standard (DES)

B.

MP3Stego

C.

Netstat

D.

Forensic Toolkit (FTK)

Buy Now
Questions 11

A police detective investigating a threat traces the source to a house. The couple at the house shows the detective the only computer the family owns, which is in their son's bedroom. The couple states that their son is presently in class at a local middle school.

How should the detective legally gain access to the computer?

Options:

A.

Obtain consent to search from the parents

B.

Wait for the son to return and ask for consent

C.

Search immediately without consent due to emergency

D.

Get a warrant without consent

Buy Now
Questions 12

Which tool can be used to make a bit-by-bit copy of a Windows Phone 8?

Options:

A.

Forensic Toolkit (FTK)

B.

Data Doctor

C.

Pwnage

D.

Wolf

Buy Now
Questions 13

Which law requires both parties to consent to the recording of a conversation?

Options:

A.

Health Insurance Portability and Accountability Act (HIPAA)

B.

Electronic Communications Privacy Act (ECPA)

C.

Wiretap Act

D.

Stored Communications Act

Buy Now
Questions 14

A company has identified that a hacker has modified files on one of the company's computers. The IT department has collected the storage media from the hacked computer.

Which evidence should be obtained from the storage media to identify which files were modified?

Options:

A.

File timestamps

B.

Private IP addresses

C.

Public IP addresses

D.

Operating system version

Buy Now
Questions 15

Which file stores local Windows passwords in the Windows\System32\ directory and is subject to being cracked by using a live CD?

Options:

A.

SAM

B.

IPSec

C.

HAL

D.

Ntidr

Buy Now
Questions 16

Which method is used to implement steganography through pictures?

Options:

A.

Metadata alteration

B.

Least Significant Bit (LSB) insertion

C.

Encrypting image pixels

D.

File compression

Buy Now
Questions 17

Which U.S. law protects journalists from turning over their work or sources to law enforcement before the information is shared with the public?

Options:

A.

The Privacy Protection Act (PPA)

B.

Health Insurance Portability and Accountability Act (HIPAA)

C.

Electronic Communications Privacy Act (ECPA)

D.

Communications Assistance to Law Enforcement Act (CALEA)

Buy Now
Questions 18

Which Windows component is responsible for reading the boot.ini file and displaying the boot loader menu on Windows XP during the boot process?

Options:

A.

BOOTMGR

B.

NTLDR

C.

Winload.exe

D.

BCD

Buy Now
Questions 19

A user at a company attempts to hide the combination to a safe that stores confidential information in a data file called vacationdetails.doc.

What is vacationdetails.doc called, in steganographic terms?

Options:

A.

Payload

B.

Snow

C.

Carrier

D.

Channel

Buy Now
Questions 20

Susan was looking at her credit report and noticed that several new credit cards had been opened lately in her name. Susan has not opened any of the credit card accounts herself.

Which type of cybercrime has been perpetrated against Susan?

Options:

A.

Identity theft

B.

SQL injection

C.

Cyberstalking

D.

Malware

Buy Now
Questions 21

Which operating system creates a swap file to temporarily store information from memory on the hard drive when needed?

Options:

A.

Linux

B.

Mac

C.

Unix

D.

Windows

Buy Now
Exam Name: Digital Forensics in Cybersecurity (D431/C840) Course Exam
Last Update: Jun 19, 2025
Questions: 74

PDF + Testing Engine

$66  $164.99

Testing Engine

$50  $124.99
buy now Digital-Forensics-in-Cybersecurity testing engine

PDF (Q&A)

$42  $104.99
buy now Digital-Forensics-in-Cybersecurity pdf