Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dcdisc65

Page: 1 / 3
Total 22 questions
Exam Code: Digital-Forensics-in-Cybersecurity                Update: Oct 15, 2025
Exam Name: Digital Forensics in Cybersecurity (D431/C840) Course Exam

WGU Digital Forensics in Cybersecurity (D431/C840) Course Exam Digital-Forensics-in-Cybersecurity Exam Dumps: Updated Questions & Answers (October 2025)

Question # 1

A forensic examiner is reviewing a laptop running OS X which has been compromised. The examiner wants to know if any shell commands were executed by any of the accounts.

Which log file or folder should be reviewed?

A.

/var/vm

B.

/Users//.bash_history

C.

/var/log

D.

/Users//Library/Preferences

Question # 2

Which information is included in an email header?

A.

Sender's MAC address

B.

Number of pages

C.

Content-Type

D.

Message-Digest

Question # 3

What is one purpose of steganography?

A.

To encrypt data for security

B.

To deliver information secretly

C.

To compress large files

D.

To delete files securely

Question # 4

Tom saved a message using the least significant bit (LSB) method in a sound file and uploaded this sound to his own website.

What is the carrier in this example?

A.

The least significant bit method

B.

Tom's website

C.

The sound file

D.

The message

Question # 5

Which policy is included in the CAN-SPAM Act?

A.

Email sender must provide a method for recipients to opt out of future emails without charge

B.

Email sender must encrypt all outgoing emails

C.

Email sender must verify the recipient’s consent before sending

D.

Email sender must include recipient IP address in the email header

Question # 6

Which description applies to the Advanced Forensic Format (AFF)?

A.

An open file standard developed by AccessData

B.

A proprietary format used by the iLook tool

C.

An open file standard used by Sleuth Kit and Autopsy

D.

A proprietary format developed by Guidance Software

Question # 7

Which technique allows a cybercriminal to hide information?

A.

Steganalysis

B.

Steganography

C.

Encryption

D.

Cryptography

Question # 8

Which operating system (OS) uses the NTFS (New Technology File System) file operating system?

A.

Linux

B.

Mac OS X v10.5

C.

Mac OS X v10.4

D.

Windows 8

Question # 9

How do forensic specialists show that digital evidence was handled in a protected, secure manner during the process of collecting and analyzing the evidence?

A.

By encrypting all evidence

B.

By maintaining the chain of custody

C.

By deleting temporary files

D.

By performing backups

Question # 10

Which United States law requires telecommunications equipment manufacturers to provide built-in surveillance capabilities for federal agencies?

A.

Health Insurance Portability and Accountability Act (HIPAA)

B.

Communications Assistance to Law Enforcement Act (CALEA)

C.

Electronic Communications Privacy Act (ECPA)

D.

The Privacy Protection Act (PPA)

Page: 1 / 3
Total 22 questions

Most Popular Certification Exams

Payment

       

Contact us

dumpscollection live chat

Site Secure

mcafee secure

TESTED 16 Oct 2025