Weekend Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

Digital-Forensics-in-Cybersecurity Digital Forensics in Cybersecurity (D431/C840) Course Exam Questions and Answers

Questions 4

What is a reason to use steganography?

Options:

A.

To save secret data

B.

To highlight secret data

C.

To erase secret data

D.

To delete secret data

Buy Now
Questions 5

Which technique allows a cybercriminal to hide information?

Options:

A.

Steganalysis

B.

Steganography

C.

Encryption

D.

Cryptography

Buy Now
Questions 6

An organization has identified a system breach and has collected volatile data from the system.

Which evidence type should be collected next?

Options:

A.

Running processes

B.

Network connections

C.

Temporary data

D.

File timestamps

Buy Now
Questions 7

Which law requires both parties to consent to the recording of a conversation?

Options:

A.

Health Insurance Portability and Accountability Act (HIPAA)

B.

Electronic Communications Privacy Act (ECPA)

C.

Wiretap Act

D.

Stored Communications Act

Buy Now
Questions 8

An organization believes that a company-owned mobile phone has been compromised.

Which software should be used to collect an image of the phone as digital evidence?

Options:

A.

PTFinder

B.

Forensic SIM Cloner

C.

Forensic Toolkit (FTK)

D.

Data Doctor

Buy Now
Questions 9

What are the three basic tasks that a systems forensic specialist must keep in mind when handling evidence during a cybercrime investigation?

Options:

A.

Find evidence, preserve evidence, and prepare evidence

B.

Find evidence, analyze evidence, and prosecute evidence

C.

Preserve evidence, encrypt evidence, and delete evidence

D.

Analyze evidence, prepare evidence, and document evidence

Buy Now
Questions 10

Which characteristic applies to magnetic drives compared to solid-state drives (SSDs)?

Options:

A.

Higher cost

B.

Lower cost

C.

Less susceptible to damage

D.

Faster read/write speeds

Buy Now
Questions 11

Which tool should be used with sound files, video files, and image files?

Options:

A.

Snow

B.

MP3Stego

C.

StegVideo

D.

Stealth Files 4

Buy Now
Questions 12

After a company's single-purpose, dedicated messaging server is hacked by a cybercriminal, a forensics expert is hired to investigate the crime and collect evidence.

Which digital evidence should be collected?

Options:

A.

Server configuration files

B.

Firewall logs

C.

Email contents

D.

User login credentials

Buy Now
Questions 13

The chief executive officer (CEO) of a small computer company has identified a potential hacking attack from an outside competitor.

Which type of evidence should a forensics investigator use to identify the source of the hack?

Options:

A.

Network transaction logs

B.

Email archives

C.

File system metadata

D.

Browser history

Buy Now
Questions 14

A forensic scientist is examining a computer for possible evidence of a cybercrime.

Why should the forensic scientist copy files at the bit level instead of the OS level when copying files from the computer to a forensic computer?

Options:

A.

Copying files at the OS level fails to copy deleted files or slack space.

B.

Copying files at the OS level takes too long to be practical.

C.

Copying files at the OS level changes the timestamp of the files.

D.

Copying files at the OS level will copy extra information that is unnecessary.

Buy Now
Questions 15

Which term describes the used space between the end of a file and the end of the last cluster assigned to the file?

Options:

A.

Unallocated space

B.

Volume slack

C.

Host protected area

D.

File slack

Buy Now
Questions 16

Which law includes a provision permitting the wiretapping of VoIP calls?

Options:

A.

Communications Assistance to Law Enforcement Act (CALEA)

B.

Electronic Communications Privacy Act (ECPA)

C.

Health Insurance Portability and Accountability Act (HIPAA)

D.

Stored Communications Act

Buy Now
Questions 17

A police detective investigating a threat traces the source to a house. The couple at the house shows the detective the only computer the family owns, which is in their son's bedroom. The couple states that their son is presently in class at a local middle school.

How should the detective legally gain access to the computer?

Options:

A.

Obtain consent to search from the parents

B.

Wait for the son to return and ask for consent

C.

Search immediately without consent due to emergency

D.

Get a warrant without consent

Buy Now
Questions 18

A forensics investigator is investigating a Windows computer which may be collecting data from other computers on the network.

Which Windows command line tool can be used to determine connections between machines?

Options:

A.

Telnet

B.

Xdetect

C.

Openfiles

D.

Netstat

Buy Now
Questions 19

A forensic specialist is about to collect digital evidence from a suspect's computer hard drive. The computer is off.

What should be the specialist's first step?

Options:

A.

Carefully review the chain of custody form.

B.

Turn the computer on and remove any malware.

C.

Make a forensic copy of the computer's hard drive.

D.

Turn the computer on and photograph the desktop.

Buy Now
Questions 20

Thomas received an email stating he needed to follow a link and verify his bank account information to ensure it was secure. Shortly after following the instructions, Thomas noticed money was missing from his account.

Which digital evidence should be considered to determine how Thomas' account information was compromised?

Options:

A.

Email messages

B.

Browser cache

C.

Bank transaction logs

D.

Firewall logs

Buy Now
Questions 21

Which law or guideline lists the four states a mobile device can be in when data is extracted from it?

Options:

A.

Health Insurance Portability and Accountability Act (HIPAA)

B.

NIST SP 800-72 Guidelines

C.

Electronic Communications Privacy Act (ECPA)

D.

Communications Assistance to Law Enforcement Act (CALEA)

Buy Now
Questions 22

Which policy is included in the CAN-SPAM Act?

Options:

A.

Email sender must provide a method for recipients to opt out of future emails without charge

B.

Email sender must encrypt all outgoing emails

C.

Email sender must verify the recipient’s consent before sending

D.

Email sender must include recipient IP address in the email header

Buy Now
Exam Name: Digital Forensics in Cybersecurity (D431/C840) Course Exam
Last Update: Jul 28, 2025
Questions: 74

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now Digital-Forensics-in-Cybersecurity testing engine

PDF (Q&A)

$43.57  $124.49
buy now Digital-Forensics-in-Cybersecurity pdf