Digital-Forensics-in-Cybersecurity Digital Forensics in Cybersecurity (D431/C840DQO1) Course Exam Questions and Answers
How should a forensic scientist obtain the network configuration from a Windows PC before seizing it from a crime scene?
Which U.S. law protects journalists from turning over their work or sources to law enforcement before the information is shared with the public?
A forensic investigator needs to identify where email messages are stored on a Microsoft Exchange server.
Which file extension is used by Exchange email servers to store the mailbox database?
An employee is suspected of using a company Apple iPhone 4 for inappropriate activities.
Which utility should the company use to access the iPhone without knowing the passcode?
Which law requires a search warrant or one of the recognized exceptions to search warrant requirements for searching email messages on a computer?
How do forensic specialists show that digital evidence was handled in a protected, secure manner during the process of collecting and analyzing the evidence?
Which Windows component is responsible for reading the boot.ini file and displaying the boot loader menu on Windows XP during the boot process?
A cybercriminal hacked into an Apple iPad that belongs to a company's chief executive officer (CEO). The cybercriminal deleted some important files on the data volume that must be retrieved.
Which hidden folder will contain the digital evidence?
Susan was looking at her credit report and noticed that several new credit cards had been opened lately in her name. Susan has not opened any of the credit card accounts herself.
Which type of cybercrime has been perpetrated against Susan?
Which directory contains the system's configuration files on a computer running Mac OS X?
Which characteristic applies to solid-state drives (SSDs) compared to magnetic drives?
A digital forensic examiner receives a computer used in a hacking case. The examiner is asked to extract information from the computer's Registry.
How should the examiner proceed when obtaining the requested digital evidence?
Which law is related to the disclosure of personally identifiable protected health information (PHI)?
Which principle of evidence collection states that access to evidence must be tracked from the time it is seized through its use in court?
Thomas received an email stating he needed to follow a link and verify his bank account information to ensure it was secure. Shortly after following the instructions, Thomas noticed money was missing from his account.
Which digital evidence should be considered to determine how Thomas' account information was compromised?
While collecting digital evidence from a running computer involved in a cybercrime, the forensic investigator makes a list of items that need to be collected.
Which piece of digital evidence should be collected first?