Black Friday Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

Digital-Forensics-in-Cybersecurity Sample Questions Answers

Questions 4

Where is the default location for 32-bit programs installed by a user on a 64-bit version of Windows 7?

Options:

A.

C:\ProgramData

B.

C:\Program files

C.

C:\Windows

D.

C:\Program files (x86)

Buy Now
Questions 5

A forensic investigator needs to identify where email messages are stored on a Microsoft Exchange server.

Which file extension is used by Exchange email servers to store the mailbox database?

Options:

A.

.edb

B.

.nsf

C.

.mail

D.

.db

Buy Now
Questions 6

The following line of code is an example of how to make a forensic copy of a suspect drive:

dd if=/dev/mem of=/evidence/image.memory1

Which operating system should be used to run this command?

Options:

A.

Windows

B.

Linux

C.

MacOS

D.

Unix

Buy Now
Questions 7

What is a reason to use steganography?

Options:

A.

To save secret data

B.

To highlight secret data

C.

To erase secret data

D.

To delete secret data

Buy Now
Questions 8

A victim of Internet fraud fell for an online offer after using a search engine to find a deal on an expensive software purchase. Once the victim learned about the fraud, he contacted a forensic investigator for help.

Which digital evidence should the investigator collect?

Options:

A.

Virus signatures

B.

Whois records

C.

Computer logs

D.

Email headers

Buy Now
Questions 9

Which policy is included in the CAN-SPAM Act?

Options:

A.

Email sender must provide a method for recipients to opt out of future emails without charge

B.

Email sender must encrypt all outgoing emails

C.

Email sender must verify the recipient’s consent before sending

D.

Email sender must include recipient IP address in the email header

Buy Now
Questions 10

Which law is related to the disclosure of personally identifiable protected health information (PHI)?

Options:

A.

The Privacy Protection Act (PPA)

B.

Health Insurance Portability and Accountability Act (HIPAA)

C.

Electronic Communications Privacy Act (ECPA)

D.

Communications Assistance to Law Enforcement Act (CALEA)

Buy Now
Questions 11

Susan was looking at her credit report and noticed that several new credit cards had been opened lately in her name. Susan has not opened any of the credit card accounts herself.

Which type of cybercrime has been perpetrated against Susan?

Options:

A.

Identity theft

B.

SQL injection

C.

Cyberstalking

D.

Malware

Buy Now
Questions 12

Tom saved a message using the least significant bit (LSB) method in a sound file and uploaded this sound to his own website.

What is the carrier in this example?

Options:

A.

The least significant bit method

B.

Tom's website

C.

The sound file

D.

The message

Buy Now
Questions 13

A USB flash drive was seized as evidence to be entered into a trial.

Which type of evidence is this USB flash drive?

Options:

A.

Documentary

B.

Demonstrative

C.

Testimonial

D.

Real

Buy Now
Questions 14

Which tool can be used to make a bit-by-bit copy of a Windows Phone 8?

Options:

A.

Forensic Toolkit (FTK)

B.

Data Doctor

C.

Pwnage

D.

Wolf

Buy Now
Questions 15

While collecting digital evidence from a running computer involved in a cybercrime, the forensic investigator makes a list of items that need to be collected.

Which piece of digital evidence should be collected first?

Options:

A.

Security logs

B.

Chat room logs

C.

Recently accessed files

D.

Temporary Internet files

Buy Now
Questions 16

Which rule is used for conducting electronic surveillance?

Options:

A.

All documents related to health informatics should be stored in perpetuity.

B.

All commercial email must provide an opt-out mechanism.

C.

Using a misleading domain name to deceive a person into viewing obscene material shall result in fines or imprisonment.

D.

Telecommunications equipment must have built-in surveillance capabilities for law enforcement.

Buy Now
Questions 17

A forensic examiner is reviewing a laptop running OS X which has been compromised. The examiner wants to know if any shell commands were executed by any of the accounts.

Which log file or folder should be reviewed?

Options:

A.

/var/vm

B.

/Users//.bash_history

C.

/var/log

D.

/Users//Library/Preferences

Buy Now
Questions 18

An organization has identified a system breach and has collected volatile data from the system.

Which evidence type should be collected next?

Options:

A.

Running processes

B.

Network connections

C.

Temporary data

D.

File timestamps

Buy Now
Questions 19

Which U.S. law protects journalists from turning over their work or sources to law enforcement before the information is shared with the public?

Options:

A.

The Privacy Protection Act (PPA)

B.

Health Insurance Portability and Accountability Act (HIPAA)

C.

Electronic Communications Privacy Act (ECPA)

D.

Communications Assistance to Law Enforcement Act (CALEA)

Buy Now
Questions 20

What is one purpose of steganography?

Options:

A.

To encrypt data for security

B.

To deliver information secretly

C.

To compress large files

D.

To delete files securely

Buy Now
Questions 21

Which tool identifies the presence of steganography?

Options:

A.

Disk Investigator

B.

DiskDigger

C.

Forensic Toolkit (FTK)

D.

ComputerCOP

Buy Now
Questions 22

The chief information officer of an accounting firm believes sensitive data is being exposed on the local network.

Which tool should the IT staff use to gather digital evidence about this security vulnerability?

Options:

A.

Firewall

B.

Sniffer

C.

Antivirus

D.

Packet filter

Buy Now
Questions 23

A forensic scientist is examining a computer for possible evidence of a cybercrime.

Why should the forensic scientist copy files at the bit level instead of the OS level when copying files from the computer to a forensic computer?

Options:

A.

Copying files at the OS level fails to copy deleted files or slack space.

B.

Copying files at the OS level takes too long to be practical.

C.

Copying files at the OS level changes the timestamp of the files.

D.

Copying files at the OS level will copy extra information that is unnecessary.

Buy Now
Exam Code: Digital-Forensics-in-Cybersecurity
Exam Name: Digital Forensics in Cybersecurity (D431/C840DQO1) Course Exam
Last Update: Nov 30, 2025
Questions: 79
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now Digital-Forensics-in-Cybersecurity