2024 WGU C702 EXAM WITH
CORRECT ANSWERS
A software company suspects that employees have set up automatic
corporate email forwarding to their personal inboxes against company policy.
The company hires forensic investigators to identify the employees violating
policy, with the intention of issuing warnings to them.
Which type of cybercrime investigation approach is this company taking?
Which model or legislation applies a holistic approach toward any criminal
activity as a criminal operation?
Enterprise Theory of Investigation
Racketeer Influenced and Corrupt Organizations Act
Evidence Examination
Law Enforcement Cyber Incident Reporting - CORRECT-ANSWERSEnterprise
Theory of Investigation
Which hexadecimal value should an investigator search for to find JPEG
images on a device?
Which type of steganography allows the user to physically move a file but
keep the associated files in their original location for recovery?
Whitespace
Folder
Image
Web - CORRECT-ANSWERSFolder
, An employee steals a sensitive text file by embedding it into a PNG file. The
employee then sends this file via an instant chat message to an accomplice.
Which type of steganography did this employee use?
Document
Image
Text
Web - CORRECT-ANSWERSImage
A first responder arrives at an active crime scene that has several mobile
devices.
What should this first responder do while securing the crime scene?
Leave the devices in the state they are in and put them in anti-static bags
Turn on the devices and review recently accessed data
Turn off the devices to preserve the volatile memory
Leave the devices as found and fill out chain of custody paperwork -
CORRECT-ANSWERSLeave the devices as found and fill out chain of custody
paperwork
What is a responsibility of the first responder at a crime scene?
Package and transport the evidence
Identify the presence of rootkits on the evidence
Decrypt the evidence by cracking passwords
Detect malware present on the evidence - CORRECT-ANSWERSPackage and
transport the evidence
Which step preserves the forensic integrity of volatile evidence when a
device is discovered in the powered-on state?
Documenting the procedures for shutting down the system
Collecting information with a secure command shell
Using the built-in backup utility to gather information
Copying the file with the keyboard shortcut Ctrl+C - CORRECT-
ANSWERSCollecting information with a secure command shell
Which action maintains the integrity of evidence when a forensic laptop is
used to acquire data from a compromised computer?
Connecting the machines with a straight through cable
Connecting the machines with a crossover cable
Enabling a hardware write blocker
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Elitaa. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $14.99. You're not tied to anything after your purchase.