Exam (elaborations)
WGU C702 exam questions with correct answers
WGU C702 exam questions with correct answers
[Show more]
Preview 4 out of 31 pages
Uploaded on
September 5, 2024
Number of pages
31
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers
$13.49
Also available in package deal from $51.55
100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached
Also available in package deal (1)
1. Exam (elaborations) - Wgu c702 practice questions with correct answers
2. Exam (elaborations) - C702 pre-assessment questions with correct answers.
3. Exam (elaborations) - C702 exam with verified answers.
4. Exam (elaborations) - C702 exam with correct answers
5. Exam (elaborations) - Wgu - c702 forensics and network intrusion -questions with correct answers
6. Exam (elaborations) - Wgu c702 exam questions with correct answers
7. Exam (elaborations) - C702 full exam with correct answers (2024-2025)
8. Exam (elaborations) - Wgu c702 exam with correct answers 2025
9. Exam (elaborations) - Wgu c702 chfi and oa questions with correct answers
Show more
WGU C702 exam questions with correct
answers
Computer |Forensics |- |ANSWERS✔✔ |A |set |of |methodological |procedures |and |techniques |
that |help |identify, |gather, |preserve, |extract, |interpret, |document, |and |present |evidence |from |
computers |in |a |way |that |is |legally |admissible
Cyber |Crime |- |ANSWERS✔✔ |Any |illegal |act |involving |a |computing |device, |network, |its |
systems, |or |its |applications. |Both |internal |and |external
Enterprise |Theory |of |Investigation |(ETI) |- |ANSWERS✔✔ |Methodology |for |investigating |
criminal |activity
Types |of |Cyber |Crime |- |ANSWERS✔✔ |Civil, |Criminal, |Administrative
Civil |Cases |- |ANSWERS✔✔ |Involve |disputes |between |two |parties. |Brought |for |violation |of |
contracts |and |lawsuits |where |a |guilty |outcome |generally |results |in |monetary |damages |to |the |
plaintiff
Criminal |Cases |- |ANSWERS✔✔ |Brought |by |law |enforcement |agencies |in |response |to |a |
suspected |violation |of |law |where |a |guilty |outcome |results |in |monetary |damages, |
imprisonment, |or |both
Administrative |Cases |- |ANSWERS✔✔ |An |internal |investigation |by |an |organization |to |
discover |if |its |employees/clients/partners |are |abiding |by |the |rules |or |policies |(Violation |of |
company |policies). |Non-criminal |in |nature |and |are |related |to |misconduct |or |activities |of |an |
employee
,Rules |of |Forensic |Investigation |- |ANSWERS✔✔ |Safeguard |the |integrity |of |the |evidence |and |
render |it |acceptable |in |a |court |of |law. |The |forensic |examiner |must |make |duplicate |copies |of |
the |original |evidence. |The |duplicate |copies |must |be |accurate |replications |of |the |originals, |and
|the |forensic |examiner |must |also |authenticate |the |duplicate |copies |to |avoid |questions |about |
the |integrity |of |the |evidence. |Must |not |continue |with |the |investigation |if |the |examination |is |
going |to |be |beyond |his |or |her |knowledge |level |or |skill |level.
Cyber |Crime |Investigation |Methodology/Steps |- |ANSWERS✔✔ |1.Identify |the |computer |
crime |2.Collect |preliminary |evidence |3.Obtain |court |warrant |dor |discovery/seizure |of |
evidence |4.Perform |first |responder |procedures |5.Seize |evidence |at |the |crime |scene |6. |
Transport |evidence |to |lab |7.Create |two |bitstream |copies |of |the |evidence |8. |Generate |MD5 |
checksum |of |the |images |9. |Maintain |chain |of |custody |10. |Store |original |evidence |in |secure |
location |11. |Analyze |the |image |copy |for |evidence |12. |Prepare |a |forensic |report |13. |Submit |a |
report |to |client |14. |Testify |in |course |as |an |expert |witness
Locard's |Exchange |Principle |- |ANSWERS✔✔ |Anyone |of |anything, |entering |a |crime |scene |
takes |something |of |the |scene |with |them |and |leaves |something |of |themselves |behind |when |
they |leave.
Types |of |Digital |Data |- |ANSWERS✔✔ |Volatile |Data
Non-volatile |Data
Volatile |Data |- |ANSWERS✔✔ |Temporary |information |on |a |device |that |requires |a |constant |
power |supply |and |is |deleted |if |the |power |supply |is |interrupted
Non-Volatile |Data |- |ANSWERS✔✔ |Secondary |storage |of |data. |Long-term, |persistent |data.
Permanent |data |stored |on |secondary |storage |devices, |such |as |hard |disks |and |memory |cards.
Characteristics |of |Digital |Evidence |- |ANSWERS✔✔ |1. |Be |Relevant
2. |Be |probative
3. |Be |authentic
,4. |Be |accurate
5. |Be |complete
6. |Be |convincing
7. |Be |admissible
Admissible |evidence |- |ANSWERS✔✔ |Evidence |that |can |be |legally |and |properly |introduced |
in |a |civil |or |criminal |trial.
Evidence |is |relevant |to |the |case
Authentic |Evidence |- |ANSWERS✔✔ |Evidence |that |is |in |its |original |or |genuine |state.
Investigators |must |provide |supporting |documents |regarding |the |authenticity, |accuracy, |and |
integrity |of |the |evidence
Complete |Evidence |- |ANSWERS✔✔ |Evidence |must |either |prove |or |disprove |the |fact
Reliable |Evidence |- |ANSWERS✔✔ |evidence |that |possesses |a |sufficient |degree |of |likelihood |
that |it |is |true |and |accurate
Evidence |must |be |proven |dependable |when |the |evidence |was |extracted
Believable |Evidence |- |ANSWERS✔✔ |Evidence |must |be |presented |in |a |clear |manner |and |
expert |opinions |must |be |obtained |where |necessary
Rules |of |Evidence |- |ANSWERS✔✔ |Rules |governing |the |admissibility |of |evidence |in |trial |
courts.
Best |Evidence |Rule |- |ANSWERS✔✔ |states |that |secondary |evidence, |or |a |copy, |is |inadmissible
|in |court |when |the |original |exists.
Duplicate |evidence |will |suffice |under |the |following |conditions:
-Original |evidence |is |destroyed |due |to |fire |or |flood
, -Original |evidence |is |destroyed |in |the |normal |course |of |business
-Original |evidence |is |in |possession |of |a |third |party
Forensic |Readiness |- |ANSWERS✔✔ |An |organization's |ability |to |make |optimal |use |of |digital |
evidence |in |a |limited |period |and |with |minimal |investigation |costs.
Fourth |Amendment |- |ANSWERS✔✔ |Protects |against |unreasonable |search |and |seizure. |
Government |agents |may |not |search |or |seize |areas |or |things |in |which |a |person |has |reasonable |
expectation |of |privacy, |without |a |search |warrant.
Chain |of |Custody |- |ANSWERS✔✔ |a |written |record |of |all |people |who |have |had |possession |of |
an |item |of |evidence
Rule |101: |Scope |- |ANSWERS✔✔ |These |rules |govern |proceedings |in |the |courts |of |the |United |
States |and |before |United |States |bankruptcy |judges |and |United |States |magistrate |judges, |to |the
|extent |and |with |the |exceptions |stated |in |rule |1101.
Rule |102: |Purpose |and |Construction |- |ANSWERS✔✔ |These |rules |shall |be |construed |to |
secure |fairness |in |administration, |elimination |of |unjustifiable |expense |and |delay, |and |
promotion |of |growth |and |development |of |the |law |of |evidence |to |the |end |that |the |truth |may |be
|ascertained |and |proceedings |justly |determined.
Rule |105: |Limited |Admissibility |- |ANSWERS✔✔ |When |evidence |that |is |admissible |as |to |one |
party |or |for |one |purpose |but |not |admissible |as |to |another |party |or |for |another |purpose |is |
admitted, |the |court, |upon |ITProTV |Video |Notes |for |CHFI |v9 |request, |shall |restrict |the |
evidence |to |its |proper |scope |and |instruct |the |jury |accordingly
Rule |801: |Hearsay |- |ANSWERS✔✔ |"Hearsay" |means |a |statement |that:
(1) |the |declarant |does |not |make |while |testifying |at |the |current |trial |or |hearing; |and
(2) |a |party |offers |in |evidence |to |prove |the |truth |of |the |matter |asserted |in |the |statement.