Big Black Friday Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: clap70

Digital-Forensics-in-Cybersecurity Digital Forensics in Cybersecurity (D431/C840DQO1) Course Exam Questions and Answers

Questions 4

Which principle of evidence collection states that access to evidence must be tracked from the time it is seized through its use in court?

Options:

A.

Evidence record

B.

Chain of custody

C.

Event log

D.

Audit log

Buy Now
Questions 5

Which technique allows a cybercriminal to hide information?

Options:

A.

Steganalysis

B.

Steganography

C.

Encryption

D.

Cryptography

Buy Now
Questions 6

A forensic specialist is about to collect digital evidence from a suspect's computer hard drive. The computer is off.

What should be the specialist's first step?

Options:

A.

Carefully review the chain of custody form.

B.

Turn the computer on and remove any malware.

C.

Make a forensic copy of the computer's hard drive.

D.

Turn the computer on and photograph the desktop.

Buy Now
Questions 7

A forensic investigator is acquiring evidence from an iPhone.

What should the investigator ensure before the iPhone is connected to the computer?

Options:

A.

That the phone is in jailbreak mode

B.

That the phone avoids syncing with the computer

C.

That the phone is powered off

D.

That the phone has root privilege

Buy Now
Questions 8

Which tool can be used to make a bit-by-bit copy of a Windows Phone 8?

Options:

A.

Forensic Toolkit (FTK)

B.

Data Doctor

C.

Pwnage

D.

Wolf

Buy Now
Questions 9

A cybercriminal communicates with his compatriots using steganography. The FBI discovers that the criminal group uses white space to hide data in photographs.

Which tool can the cybercriminals use to facilitate this type of communication?

Options:

A.

Steganophony

B.

Wolf

C.

Snow

D.

QuickStego

Buy Now
Questions 10

A user at a company attempts to hide the combination to a safe that stores confidential information in a data file called vacationdetails.doc.

What is vacationdetails.doc called, in steganographic terms?

Options:

A.

Payload

B.

Snow

C.

Carrier

D.

Channel

Buy Now
Questions 11

Which characteristic applies to magnetic drives compared to solid-state drives (SSDs)?

Options:

A.

Higher cost

B.

Lower cost

C.

Less susceptible to damage

D.

Faster read/write speeds

Buy Now
Questions 12

Which Windows 7 operating system log stores events collected from remote computers?

Options:

A.

System

B.

Application

C.

ForwardedEvents

D.

Security

Buy Now
Questions 13

Which law includes a provision permitting the wiretapping of VoIP calls?

Options:

A.

Communications Assistance to Law Enforcement Act (CALEA)

B.

Electronic Communications Privacy Act (ECPA)

C.

Health Insurance Portability and Accountability Act (HIPAA)

D.

Stored Communications Act

Buy Now
Questions 14

Thomas received an email stating he needed to follow a link and verify his bank account information to ensure it was secure. Shortly after following the instructions, Thomas noticed money was missing from his account.

Which digital evidence should be considered to determine how Thomas' account information was compromised?

Options:

A.

Email messages

B.

Browser cache

C.

Bank transaction logs

D.

Firewall logs

Buy Now
Questions 15

Which tool should a forensic investigator use to determine whether data are leaving an organization through steganographic methods?

Options:

A.

Data Encryption Standard (DES)

B.

MP3Stego

C.

Netstat

D.

Forensic Toolkit (FTK)

Buy Now
Questions 16

What is a reason to use steganography?

Options:

A.

To save secret data

B.

To highlight secret data

C.

To erase secret data

D.

To delete secret data

Buy Now
Questions 17

The human resources manager of a small accounting firm believes he may have been a victim of a phishing scam. The manager clicked on a link in an email message that asked him to verify the logon credentials for the firm's online bank account.

Which digital evidence should a forensic investigator collect to investigate this incident?

Options:

A.

Email headers

B.

Browser cache

C.

System logs

D.

Network traffic logs

Buy Now
Questions 18

Which directory contains the system's configuration files on a computer running Mac OS X?

Options:

A.

/var

B.

/bin

C.

/etc

D.

/cfg

Buy Now
Questions 19

A forensic investigator wants to collect evidence from a file created by a Macintosh computer running OS X 10.8.

Which file type can be created by this OS?

Options:

A.

ReiserFS

B.

MFS

C.

HFS+

D.

NTFS

Buy Now
Questions 20

Which type of information does a Windows SAM file contain?

Options:

A.

Hash of network passwords

B.

Encrypted network passwords

C.

Hash of local Windows passwords

D.

Encrypted local Windows passwords

Buy Now
Questions 21

Which storage format is a magnetic drive?

Options:

A.

CD-ROM

B.

SATA

C.

Blu-ray

D.

SSD

Buy Now
Questions 22

Where is the default location for 32-bit programs installed by a user on a 64-bit version of Windows 7?

Options:

A.

C:\ProgramData

B.

C:\Program files

C.

C:\Windows

D.

C:\Program files (x86)

Buy Now
Questions 23

Which policy is included in the CAN-SPAM Act?

Options:

A.

Email sender must provide a method for recipients to opt out of future emails without charge

B.

Email sender must encrypt all outgoing emails

C.

Email sender must verify the recipient’s consent before sending

D.

Email sender must include recipient IP address in the email header

Buy Now
Exam Name: Digital Forensics in Cybersecurity (D431/C840DQO1) Course Exam
Last Update: Nov 22, 2025
Questions: 79
Digital-Forensics-in-Cybersecurity pdf

Digital-Forensics-in-Cybersecurity PDF

$25.5  $84.99
Digital-Forensics-in-Cybersecurity Engine

Digital-Forensics-in-Cybersecurity Testing Engine

$30  $99.99
Digital-Forensics-in-Cybersecurity PDF + Engine

Digital-Forensics-in-Cybersecurity PDF + Testing Engine

$40.5  $134.99