Practice WGU Digital-Forensics-in-Cybersecurity Exam Questions
-
-
Page: 1/15
Total 74 Questions
Question No 1
An organization believes that a company - owned mobile phone has been compromised. Which software should be used to collect an image of the phone as digital evidence?
Question No 2
A digital forensic examiner receives a computer used in a hacking case. The examiner is asked to extract information from the computer's Registry. How should the examiner proceed when obtaining the requested digital evidence?
Question No 3
A victim of Internet fraud fell for an online offer after using a search engine to find a deal on an expensive software purchase. Once the victim learned about the fraud, he contacted a forensic investigator for help. Which digital evidence should the investigator collect?
Question No 4
A cybercriminal hacked into an Apple iPad that belongs to a company's chief executive officer (CEO). The cybercriminal deleted some important files on the data volume that must be retrieved. Which hidden folder will contain the digital evidence?
Question No 5
Susan was looking at her credit report and noticed that several new credit cards had been opened lately in her name. Susan has not opened any of the credit card accounts herself. Which type of cybercrime has been perpetrated against Susan?
-
Page: 1/15
Total 74 Questions
-
