Black Friday Special Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

Page: 1 / 3
Total 23 questions
Exam Code: Digital-Forensics-in-Cybersecurity                Update: Nov 30, 2025
Exam Name: Digital Forensics in Cybersecurity (D431/C840DQO1) Course Exam

WGU Digital Forensics in Cybersecurity (D431/C840DQO1) Course Exam Digital-Forensics-in-Cybersecurity Exam Dumps: Updated Questions & Answers (November 2025)

Question # 1

Which Windows 7 operating system log stores events collected from remote computers?

A.

System

B.

Application

C.

ForwardedEvents

D.

Security

Question # 2

Which tool should a forensic investigator use to determine whether data are leaving an organization through steganographic methods?

A.

Data Encryption Standard (DES)

B.

MP3Stego

C.

Netstat

D.

Forensic Toolkit (FTK)

Question # 3

Which law includes a provision permitting the wiretapping of VoIP calls?

A.

Communications Assistance to Law Enforcement Act (CALEA)

B.

Electronic Communications Privacy Act (ECPA)

C.

Health Insurance Portability and Accountability Act (HIPAA)

D.

Stored Communications Act

Question # 4

What is a reason to use steganography?

A.

To save secret data

B.

To highlight secret data

C.

To erase secret data

D.

To delete secret data

Question # 5

Which directory contains the system's configuration files on a computer running Mac OS X?

A.

/var

B.

/bin

C.

/etc

D.

/cfg

Question # 6

Thomas received an email stating he needed to follow a link and verify his bank account information to ensure it was secure. Shortly after following the instructions, Thomas noticed money was missing from his account.

Which digital evidence should be considered to determine how Thomas' account information was compromised?

A.

Email messages

B.

Browser cache

C.

Bank transaction logs

D.

Firewall logs

Question # 7

The human resources manager of a small accounting firm believes he may have been a victim of a phishing scam. The manager clicked on a link in an email message that asked him to verify the logon credentials for the firm's online bank account.

Which digital evidence should a forensic investigator collect to investigate this incident?

A.

Email headers

B.

Browser cache

C.

System logs

D.

Network traffic logs

Question # 8

A forensic investigator wants to collect evidence from a file created by a Macintosh computer running OS X 10.8.

Which file type can be created by this OS?

A.

ReiserFS

B.

MFS

C.

HFS+

D.

NTFS

Question # 9

Which policy is included in the CAN-SPAM Act?

A.

Email sender must provide a method for recipients to opt out of future emails without charge

B.

Email sender must encrypt all outgoing emails

C.

Email sender must verify the recipient’s consent before sending

D.

Email sender must include recipient IP address in the email header

Question # 10

Which type of information does a Windows SAM file contain?

A.

Hash of network passwords

B.

Encrypted network passwords

C.

Hash of local Windows passwords

D.

Encrypted local Windows passwords

Page: 1 / 3
Total 23 questions

Most Popular Certification Exams

Payment

       

Contact us

dumpscollection live chat

Site Secure

mcafee secure

TESTED 30 Nov 2025