WGU
WGU (D431/C840) Digital Forensics in Cybersecurity Course
Q1:
Which law includes a provision permitting the wiretapping of VoIP calls?
○
A
Communications Assistance to Law Enforcement Act (CALEA)○
B
Electronic Communications Privacy Act (ECPA)○
C
Health Insurance Portability and Accountability Act (HIPAA)○
D
Stored Communications Act
WGU
WGU (D431/C840) Digital Forensics in Cybersecurity Course
Q2:
Which tool identifies the presence of steganography?
○
A
Disk Investigator○
B
DiskDigger○
C
Forensic Toolkit (FTK)○
D
ComputerCOP
WGU
WGU (D431/C840) Digital Forensics in Cybersecurity Course
Q3:
Which law is related to the disclosure of personally identifiable protected health information (PHI)?
○
A
The Privacy Protection Act (PPA)○
B
Health Insurance Portability and Accountability Act (HIPAA)○
C
Electronic Communications Privacy Act (ECPA)○
D
Communications Assistance to Law Enforcement Act (CALEA)
WGU
WGU (D431/C840) Digital Forensics in Cybersecurity Course
Q4:
A cybercriminal hacked into an Apple iPad that belongs to a company's chief executive officer (CEO). The cybercriminal deleted some important files on the data volume that must be retrieved.
Which hidden folder will contain the digital evidence?
○
A
/Private/etc○
B
/lost+found○
C
/.Trashes/501○
D
/etc
WGU
WGU (D431/C840) Digital Forensics in Cybersecurity Course
Q5:
The chief information officer of an accounting firm believes sensitive data is being exposed on the local network.
Which tool should the IT staff use to gather digital evidence about this security vulnerability?
○
A
Firewall○
B
Sniffer○
C
Antivirus○
D
Packet filter