100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten
logo-home
WGU C702 Forensics and Network Intrusion Final Exam Questions with Verified Answers (Updated)| Latest 2024/2025 $11.49
In winkelwagen

Tentamen (uitwerkingen)

WGU C702 Forensics and Network Intrusion Final Exam Questions with Verified Answers (Updated)| Latest 2024/2025

 0 keer verkocht
  • Vak
  • WGU C702
  • Instelling
  • WGU C702

Company A is using Company B to host data. Company A lets Company B perform all the daily activities of managing the data. Company A's customers are unaware of the security procedures Company B uses to host the data. Which threat does this depict? Unknown risk profile During a recent scan of a...

[Meer zien]

Voorbeeld 3 van de 20  pagina's

  • 8 oktober 2024
  • 20
  • 2024/2025
  • Tentamen (uitwerkingen)
  • Vragen en antwoorden
  • wgu c702
  • WGU C702
  • WGU C702
avatar-seller
AcademiaExpert
WGU C702 Forensics and Network Intrusion Final
i- i- i- i- i- i- i-




Exam Questions with Verified Answers (Updated)
i- i- i- i- i-




Company A is using Company B to host data. Company A lets Company B
i- i- i- i- i- i- i- i- i- i- i- i- i- i-



perform all the daily activities of managing the data. Company A's
i- i- i- i- i- i- i- i- i- i- i-



customers are unaware of the security procedures Company B uses to
i- i- i- i- i- i- i- i- i- i- i-



host the data. Which threat does this depict?
i- i- Unknown risk profile
i- i- i- i- i- i-i- i- i- i-




During a recent scan of a network, a network administrator sent ICMP
i- i- i- i- i- i- i- i- i- i- i- i-



echo 8 packets to each IP address being used in the network. The ICMP
i- i- i- i- i- i- i- i- i- i- i- i- i- i-



echo 8 packets contained an invalid media access control (MAC) address.
i- i- i- i- i- i- i- i- i- i- i-



Logs showed that one device replied with ICMP echo 0 packets. What
i- i- i- i- i- i- i- i- i- i- i- i-



does the reply from the single device indicate?
i- i- The machine is in i- i- i- i- i- i-i- i- i- i- i- i-



promiscuous mode. i-




A forensic investigator is performing malware analysis on a Windows
i- i- i- i- i- i- i- i- i- i-



computer. The investigator believes malware has replaced the legitimate
i- i- i- i- i- i- i- i- i-



drivers with fake versions. What should the investigator look at to
i- i- i- i- i- i- i- i- i- i- i-



confirm these suspicions?
i- The digital signatures on the drivers i- i-i- i- i- i- i- i- i-




A forensic investigator is using a hex editor to view file signatures for
i- i- i- i- i- i- i- i- i- i- i- i- i-



graphics. Which type of file is the investigator viewing when the first
i- i- i- i- i- i- i- i- i- i- i- i-



hexadecimal characters are 42 4D? BMP i- i- i- i- i-i- i-

,Where should an investigator look in the registry to find artifacts if there
i- i- i- i- i- i- i- i- i- i- i- i- i-



is malware on a Windows system?
i- i- i- i- i- i-i- i-



HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run


A forensic investigator is searching a Windows XP computer image for
i- i- i- i- i- i- i- i- i- i- i-



information about a deleted Word document. The investigator already
i- i- i- i- i- i- i- i- i-



viewed the sixth file that was deleted from the computer. Two additional
i- i- i- i- i- i- i- i- i- i- i- i-



files were deleted. What is the name of the last file the investigator
i- i- i- i- i- i- i- i- i- i- i- i- i-



opens? $R7.doc i-i- i-




Which documentation should a forensic examiner prepare prior to a
i- i- i- i- i- i- i- i- i- i-



dynamic analysis? The full path and location of the file being
i- i-i- i- i- i- i- i- i- i- i- i- i-



investigated


What allows for a lawful search to be conducted without a warrant or
i- i- i- i- i- i- i- i- i- i- i- i- i-



probable cause? Consent of person with authority
i- i-i- i- i- i- i- i-




A forensic investigator is tasked with retrieving evidence where the
i- i- i- i- i- i- i- i- i- i-



primary server has been erased. The investigator needs to rely on
i- i- i- i- i- i- i- i- i- i- i-



network logs and backup tapes to base their conclusions on while
i- i- i- i- i- i- i- i- i- i- i-



testifying in court. Which information found in rules of evidence, Rule
i- i- i- i- i- i- i- i- i- i- i-



1001, helps determine if this testimony is acceptable to the court?
i- i- i- i- i- i- i- i- i- i- i-i- i-



Definition of original evidence i- i- i-

, When can a forensic investigator collect evidence without formal
i- i- i- i- i- i- i- i- i-



consent? When properly worded banners are displayed on the
i-i- i- i- i- i- i- i- i- i- i-



computer screen i-




Who determines whether a forensic investigation should take place if a
i- i- i- i- i- i- i- i- i- i- i-



situation is undocumented in the standard operating procedures?
i- i- i- i- i- i- i- i-i- i-



Decision maker i-




Which situation leads to a civil investigation?
i- i- i- i- i- i- i-i- i- Disputes between two i- i- i-



parties that relate to a contract violation
i- i- i- i- i- i-




What is the goal for an attacker using a directory traversal attack?
i- i- i- To i- i- i- i- i- i- i- i- i-i- i- i-



access areas in the system in which the attacker should not have access
i- i- i- i- i- i- i- i- i- i- i- i-




Which rule does a forensic investigator need to follow?
i- i- i- i- i- i- i- i- i-i- i- Use well- i-



known standard procedures
i- i-




What is the focus of Locard's exchange principle?
i- i- Anyone entering a
i- i- i- i- i- i-i- i- i- i- i-



crime scene takes something with them and leaves something behind.
i- i- i- i- i- i- i- i- i-




What is the focus of the enterprise theory of investigation (ETI)?
i- i- i- i- i- i- i- i- i- i- i-i- i-



Solving one crime can tie it back to a criminal organization's activities.
i- i- i- i- i- i- i- i- i- i- i-

Dit zijn jouw voordelen als je samenvattingen koopt bij Stuvia:

Bewezen kwaliteit door reviews

Bewezen kwaliteit door reviews

Studenten hebben al meer dan 850.000 samenvattingen beoordeeld. Zo weet jij zeker dat je de beste keuze maakt!

In een paar klikken geregeld

In een paar klikken geregeld

Geen gedoe — betaal gewoon eenmalig met iDeal, Bancontact of creditcard en je bent klaar. Geen abonnement nodig.

Focus op de essentie

Focus op de essentie

Studenten maken samenvattingen voor studenten. Dat betekent: actuele inhoud waar jij écht wat aan hebt. Geen overbodige details!

Veelgestelde vragen

Wat krijg ik als ik dit document koop?

Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.

Tevredenheidsgarantie: hoe werkt dat?

Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.

Van wie koop ik deze samenvatting?

Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper AcademiaExpert. Stuvia faciliteert de betaling aan de verkoper.

Zit ik meteen vast aan een abonnement?

Nee, je koopt alleen deze samenvatting voor $11.49. Je zit daarna nergens aan vast.

Is Stuvia te vertrouwen?

4,6 sterren op Google & Trustpilot (+1000 reviews)

Afgelopen 30 dagen zijn er 63950 samenvattingen verkocht

Opgericht in 2010, al 15 jaar dé plek om samenvattingen te kopen

Start met verkopen
$11.49
  • (0)
In winkelwagen
Toegevoegd