New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

Digital-Forensics-in-Cybersecurity Digital Forensics in Cybersecurity (D431/C840DQO1) Course Exam Questions and Answers

Questions 4

How should a forensic scientist obtain the network configuration from a Windows PC before seizing it from a crime scene?

Options:

A.

By checking the system properties

B.

By using the ipconfig command from a command prompt on the computer

C.

By opening the Network and Sharing Center

D.

By rebooting the computer into safe mode

Buy Now
Questions 5

Which U.S. law protects journalists from turning over their work or sources to law enforcement before the information is shared with the public?

Options:

A.

The Privacy Protection Act (PPA)

B.

Health Insurance Portability and Accountability Act (HIPAA)

C.

Electronic Communications Privacy Act (ECPA)

D.

Communications Assistance to Law Enforcement Act (CALEA)

Buy Now
Questions 6

Which method of copying digital evidence ensures proper evidence collection?

Options:

A.

File-level copy

B.

Bit-level copy

C.

Cloud backup

D.

Encrypted transfer

Buy Now
Questions 7

A forensic investigator needs to identify where email messages are stored on a Microsoft Exchange server.

Which file extension is used by Exchange email servers to store the mailbox database?

Options:

A.

.edb

B.

.nsf

C.

.mail

D.

.db

Buy Now
Questions 8

An employee is suspected of using a company Apple iPhone 4 for inappropriate activities.

Which utility should the company use to access the iPhone without knowing the passcode?

Options:

A.

Data Doctor

B.

Forensic Toolkit (FTK)

C.

Device Seizure

D.

Autopsy

Buy Now
Questions 9

Which law requires a search warrant or one of the recognized exceptions to search warrant requirements for searching email messages on a computer?

Options:

A.

The Fourth Amendment to the U.S. Constitution

B.

Electronic Communications Privacy Act (ECPA)

C.

Stored Communications Act

D.

Communications Assistance to Law Enforcement Act (CALEA)

Buy Now
Questions 10

How do forensic specialists show that digital evidence was handled in a protected, secure manner during the process of collecting and analyzing the evidence?

Options:

A.

By encrypting all evidence

B.

By maintaining the chain of custody

C.

By deleting temporary files

D.

By performing backups

Buy Now
Questions 11

Which Windows component is responsible for reading the boot.ini file and displaying the boot loader menu on Windows XP during the boot process?

Options:

A.

BOOTMGR

B.

NTLDR

C.

Winload.exe

D.

BCD

Buy Now
Questions 12

A cybercriminal hacked into an Apple iPad that belongs to a company's chief executive officer (CEO). The cybercriminal deleted some important files on the data volume that must be retrieved.

Which hidden folder will contain the digital evidence?

Options:

A.

/Private/etc

B.

/lost+found

C.

/.Trashes/501

D.

/etc

Buy Now
Questions 13

Which tool can be used to make a bit-by-bit copy of a Windows Phone 8?

Options:

A.

Forensic Toolkit (FTK)

B.

Data Doctor

C.

Pwnage

D.

Wolf

Buy Now
Questions 14

Susan was looking at her credit report and noticed that several new credit cards had been opened lately in her name. Susan has not opened any of the credit card accounts herself.

Which type of cybercrime has been perpetrated against Susan?

Options:

A.

Identity theft

B.

SQL injection

C.

Cyberstalking

D.

Malware

Buy Now
Questions 15

Which directory contains the system's configuration files on a computer running Mac OS X?

Options:

A.

/var

B.

/bin

C.

/etc

D.

/cfg

Buy Now
Questions 16

Which technique allows a cybercriminal to hide information?

Options:

A.

Steganalysis

B.

Steganography

C.

Encryption

D.

Cryptography

Buy Now
Questions 17

What is a reason to use steganography?

Options:

A.

To save secret data

B.

To highlight secret data

C.

To erase secret data

D.

To delete secret data

Buy Now
Questions 18

Which characteristic applies to solid-state drives (SSDs) compared to magnetic drives?

Options:

A.

They are less susceptible to damage

B.

They have moving parts

C.

They are generally slower

D.

They have a lower cost per gigabyte

Buy Now
Questions 19

A digital forensic examiner receives a computer used in a hacking case. The examiner is asked to extract information from the computer's Registry.

How should the examiner proceed when obtaining the requested digital evidence?

Options:

A.

Ensure that any tools and techniques used are widely accepted

B.

Investigate whether the computer was properly seized

C.

Enlist a colleague to witness the investigative process

D.

Download a tool from a hacking website to extract the data

Buy Now
Questions 20

Which law is related to the disclosure of personally identifiable protected health information (PHI)?

Options:

A.

The Privacy Protection Act (PPA)

B.

Health Insurance Portability and Accountability Act (HIPAA)

C.

Electronic Communications Privacy Act (ECPA)

D.

Communications Assistance to Law Enforcement Act (CALEA)

Buy Now
Questions 21

Which principle of evidence collection states that access to evidence must be tracked from the time it is seized through its use in court?

Options:

A.

Evidence record

B.

Chain of custody

C.

Event log

D.

Audit log

Buy Now
Questions 22

Thomas received an email stating he needed to follow a link and verify his bank account information to ensure it was secure. Shortly after following the instructions, Thomas noticed money was missing from his account.

Which digital evidence should be considered to determine how Thomas' account information was compromised?

Options:

A.

Email messages

B.

Browser cache

C.

Bank transaction logs

D.

Firewall logs

Buy Now
Questions 23

While collecting digital evidence from a running computer involved in a cybercrime, the forensic investigator makes a list of items that need to be collected.

Which piece of digital evidence should be collected first?

Options:

A.

Security logs

B.

Chat room logs

C.

Recently accessed files

D.

Temporary Internet files

Buy Now
Exam Name: Digital Forensics in Cybersecurity (D431/C840DQO1) Course Exam
Last Update: Dec 14, 2025
Questions: 79

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99