Summer Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

Digital-Forensics-in-Cybersecurity Sample Questions Answers

Questions 4

Which characteristic applies to magnetic drives compared to solid-state drives (SSDs)?

Options:

A.

Higher cost

B.

Lower cost

C.

Less susceptible to damage

D.

Faster read/write speeds

Buy Now
Questions 5

A digital forensic examiner receives a computer used in a hacking case. The examiner is asked to extract information from the computer's Registry.

How should the examiner proceed when obtaining the requested digital evidence?

Options:

A.

Ensure that any tools and techniques used are widely accepted

B.

Investigate whether the computer was properly seized

C.

Enlist a colleague to witness the investigative process

D.

Download a tool from a hacking website to extract the data

Buy Now
Questions 6

Which method of copying digital evidence ensures proper evidence collection?

Options:

A.

File-level copy

B.

Bit-level copy

C.

Cloud backup

D.

Encrypted transfer

Buy Now
Questions 7

Which type of information does a Windows SAM file contain?

Options:

A.

Hash of network passwords

B.

Encrypted network passwords

C.

Hash of local Windows passwords

D.

Encrypted local Windows passwords

Buy Now
Questions 8

Which technique allows a cybercriminal to hide information?

Options:

A.

Steganalysis

B.

Steganography

C.

Encryption

D.

Cryptography

Buy Now
Questions 9

Which law requires both parties to consent to the recording of a conversation?

Options:

A.

Health Insurance Portability and Accountability Act (HIPAA)

B.

Electronic Communications Privacy Act (ECPA)

C.

Wiretap Act

D.

Stored Communications Act

Buy Now
Questions 10

Which principle of evidence collection states that access to evidence must be tracked from the time it is seized through its use in court?

Options:

A.

Evidence record

B.

Chain of custody

C.

Event log

D.

Audit log

Buy Now
Questions 11

The chief information security officer of a company believes that an attacker has infiltrated the company's network and is using steganography to communicate with external sources. A security team is investigating the incident. They are told to start by focusing on the core elements of steganography.

What are the core elements of steganography?

Options:

A.

Payload, carrier, channel

B.

Encryption, decryption, key

C.

File, metadata, header

D.

Hash, nonce, salt

Buy Now
Questions 12

Where does Windows store passwords for local user accounts?

Options:

A.

HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles

B.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WZCSVC\Parameters\Interfaces

C.

SAM file in Windows\System32

D.

Security file in Windows\System32

Buy Now
Questions 13

A computer involved in a crime is infected with malware. The computer is on and connected to the company's network. The forensic investigator arrives at the scene.

Which action should be the investigator's first step?

Options:

A.

Turn off the computer

B.

Unplug the computer's Ethernet cable

C.

Run malware removal tools

D.

Copy files to external media

Buy Now
Questions 14

How do forensic specialists show that digital evidence was handled in a protected, secure manner during the process of collecting and analyzing the evidence?

Options:

A.

By encrypting all evidence

B.

By maintaining the chain of custody

C.

By deleting temporary files

D.

By performing backups

Buy Now
Questions 15

A forensic scientist arrives at a crime scene to begin collecting evidence.

What is the first thing the forensic scientist should do?

Options:

A.

Seize the computer immediately

B.

Photograph all evidence in its original place

C.

Document user passwords

D.

Run antivirus scans

Buy Now
Questions 16

A forensic scientist is examining a computer for possible evidence of a cybercrime.

Why should the forensic scientist copy files at the bit level instead of the OS level when copying files from the computer to a forensic computer?

Options:

A.

Copying files at the OS level fails to copy deleted files or slack space.

B.

Copying files at the OS level takes too long to be practical.

C.

Copying files at the OS level changes the timestamp of the files.

D.

Copying files at the OS level will copy extra information that is unnecessary.

Buy Now
Questions 17

The chief information officer of an accounting firm believes sensitive data is being exposed on the local network.

Which tool should the IT staff use to gather digital evidence about this security vulnerability?

Options:

A.

Firewall

B.

Sniffer

C.

Antivirus

D.

Packet filter

Buy Now
Questions 18

Which term describes the used space between the end of a file and the end of the last cluster assigned to the file?

Options:

A.

Unallocated space

B.

Volume slack

C.

Host protected area

D.

File slack

Buy Now
Questions 19

A user at a company attempts to hide the combination to a safe that stores confidential information in a data file called vacationdetails.doc.

What is vacationdetails.doc called, in steganographic terms?

Options:

A.

Payload

B.

Snow

C.

Carrier

D.

Channel

Buy Now
Questions 20

Which law includes a provision permitting the wiretapping of VoIP calls?

Options:

A.

Communications Assistance to Law Enforcement Act (CALEA)

B.

Electronic Communications Privacy Act (ECPA)

C.

Health Insurance Portability and Accountability Act (HIPAA)

D.

Stored Communications Act

Buy Now
Questions 21

Which type of storage format should be transported in a special bag to reduce electrostatic interference?

Options:

A.

Solid-state drives

B.

Magnetic media

C.

Optical discs

D.

Flash drives

Buy Now
Questions 22

Susan was looking at her credit report and noticed that several new credit cards had been opened lately in her name. Susan has not opened any of the credit card accounts herself.

Which type of cybercrime has been perpetrated against Susan?

Options:

A.

Identity theft

B.

SQL injection

C.

Cyberstalking

D.

Malware

Buy Now
Exam Code: Digital-Forensics-in-Cybersecurity
Exam Name: Digital Forensics in Cybersecurity (D431/C840) Course Exam
Last Update: Oct 15, 2025
Questions: 74
$66  $164.99
$50  $124.99
$42  $104.99
buy now Digital-Forensics-in-Cybersecurity