100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
WGU C702 Forensics and Network Intrusion Final Exam Questions with Verified Answers (Updated)| Latest 2024/2025 $11.49   Add to cart

Exam (elaborations)

WGU C702 Forensics and Network Intrusion Final Exam Questions with Verified Answers (Updated)| Latest 2024/2025

 1 view  0 purchase
  • Course
  • WGU C702
  • Institution
  • WGU C702

Company A is using Company B to host data. Company A lets Company B perform all the daily activities of managing the data. Company A's customers are unaware of the security procedures Company B uses to host the data. Which threat does this depict? Unknown risk profile During a recent scan of a...

[Show more]

Preview 3 out of 20  pages

  • October 8, 2024
  • 20
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • wgu c702
  • WGU C702
  • WGU C702
avatar-seller
AcademiaExpert
WGU C702 Forensics and Network Intrusion Final
i- i- i- i- i- i- i-




Exam Questions with Verified Answers (Updated)
i- i- i- i- i-




Company A is using Company B to host data. Company A lets Company B
i- i- i- i- i- i- i- i- i- i- i- i- i- i-



perform all the daily activities of managing the data. Company A's
i- i- i- i- i- i- i- i- i- i- i-



customers are unaware of the security procedures Company B uses to
i- i- i- i- i- i- i- i- i- i- i-



host the data. Which threat does this depict?
i- i- Unknown risk profile
i- i- i- i- i- i-i- i- i- i-




During a recent scan of a network, a network administrator sent ICMP
i- i- i- i- i- i- i- i- i- i- i- i-



echo 8 packets to each IP address being used in the network. The ICMP
i- i- i- i- i- i- i- i- i- i- i- i- i- i-



echo 8 packets contained an invalid media access control (MAC) address.
i- i- i- i- i- i- i- i- i- i- i-



Logs showed that one device replied with ICMP echo 0 packets. What
i- i- i- i- i- i- i- i- i- i- i- i-



does the reply from the single device indicate?
i- i- The machine is in i- i- i- i- i- i-i- i- i- i- i- i-



promiscuous mode. i-




A forensic investigator is performing malware analysis on a Windows
i- i- i- i- i- i- i- i- i- i-



computer. The investigator believes malware has replaced the legitimate
i- i- i- i- i- i- i- i- i-



drivers with fake versions. What should the investigator look at to
i- i- i- i- i- i- i- i- i- i- i-



confirm these suspicions?
i- The digital signatures on the drivers i- i-i- i- i- i- i- i- i-




A forensic investigator is using a hex editor to view file signatures for
i- i- i- i- i- i- i- i- i- i- i- i- i-



graphics. Which type of file is the investigator viewing when the first
i- i- i- i- i- i- i- i- i- i- i- i-



hexadecimal characters are 42 4D? BMP i- i- i- i- i-i- i-

,Where should an investigator look in the registry to find artifacts if there
i- i- i- i- i- i- i- i- i- i- i- i- i-



is malware on a Windows system?
i- i- i- i- i- i-i- i-



HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run


A forensic investigator is searching a Windows XP computer image for
i- i- i- i- i- i- i- i- i- i- i-



information about a deleted Word document. The investigator already
i- i- i- i- i- i- i- i- i-



viewed the sixth file that was deleted from the computer. Two additional
i- i- i- i- i- i- i- i- i- i- i- i-



files were deleted. What is the name of the last file the investigator
i- i- i- i- i- i- i- i- i- i- i- i- i-



opens? $R7.doc i-i- i-




Which documentation should a forensic examiner prepare prior to a
i- i- i- i- i- i- i- i- i- i-



dynamic analysis? The full path and location of the file being
i- i-i- i- i- i- i- i- i- i- i- i- i-



investigated


What allows for a lawful search to be conducted without a warrant or
i- i- i- i- i- i- i- i- i- i- i- i- i-



probable cause? Consent of person with authority
i- i-i- i- i- i- i- i-




A forensic investigator is tasked with retrieving evidence where the
i- i- i- i- i- i- i- i- i- i-



primary server has been erased. The investigator needs to rely on
i- i- i- i- i- i- i- i- i- i- i-



network logs and backup tapes to base their conclusions on while
i- i- i- i- i- i- i- i- i- i- i-



testifying in court. Which information found in rules of evidence, Rule
i- i- i- i- i- i- i- i- i- i- i-



1001, helps determine if this testimony is acceptable to the court?
i- i- i- i- i- i- i- i- i- i- i-i- i-



Definition of original evidence i- i- i-

, When can a forensic investigator collect evidence without formal
i- i- i- i- i- i- i- i- i-



consent? When properly worded banners are displayed on the
i-i- i- i- i- i- i- i- i- i- i-



computer screen i-




Who determines whether a forensic investigation should take place if a
i- i- i- i- i- i- i- i- i- i- i-



situation is undocumented in the standard operating procedures?
i- i- i- i- i- i- i- i-i- i-



Decision maker i-




Which situation leads to a civil investigation?
i- i- i- i- i- i- i-i- i- Disputes between two i- i- i-



parties that relate to a contract violation
i- i- i- i- i- i-




What is the goal for an attacker using a directory traversal attack?
i- i- i- To i- i- i- i- i- i- i- i- i-i- i- i-



access areas in the system in which the attacker should not have access
i- i- i- i- i- i- i- i- i- i- i- i-




Which rule does a forensic investigator need to follow?
i- i- i- i- i- i- i- i- i-i- i- Use well- i-



known standard procedures
i- i-




What is the focus of Locard's exchange principle?
i- i- Anyone entering a
i- i- i- i- i- i-i- i- i- i- i-



crime scene takes something with them and leaves something behind.
i- i- i- i- i- i- i- i- i-




What is the focus of the enterprise theory of investigation (ETI)?
i- i- i- i- i- i- i- i- i- i- i-i- i-



Solving one crime can tie it back to a criminal organization's activities.
i- i- i- i- i- i- i- i- i- i- i-

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller AcademiaExpert. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $11.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

78834 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$11.49
  • (0)
  Add to cart