2024 WGU C702 CHFI AND OA
EXAM WITH CORRECT ANSWERS
Which of the following is true regarding computer forensics? - CORRECT-
ANSWERSComputer forensics deals with the process of finding evidence
related to a digital crime to find the culprits and initiate legal action against
them.
Which of the following is NOT a objective of computer forensics? - CORRECT-
ANSWERSDocument vulnerabilities allowing further loss of intellectual
property, finances, and reputation during an attack.
What is a common technique used to distribute malware on the web with
tactics such as keyword stuffing, doorway pages, page swapping, and adding
unrelated keywords to get higher search engine ranking for malware pages?
- CORRECT-ANSWERSBlackhat SEO
What is a common technique used to distribute malware on the web by
mimicking legitimate institutions in an attempt to steal passwords, credit
cards, and account data? - CORRECT-ANSWERSSpear phishing sites
What is a common technique used to distribute malware on the web by
embedding malware-laden advertisements in authentic online advertising
channels to spread onto systems of unsuspecting users? - CORRECT-
ANSWERSMalvertising
What is a common technique used to distribute malware on the web when an
attacker exploits flaws in browser software to install malware just by merely
visiting a website? - CORRECT-ANSWERSDrive by downloads
When a reputable website is infected with malware that secretly installs itself
on a visitor's system and thereafter carries out malicious activities, it is an
example of which common technique used by hackers to distribute malware?
- CORRECT-ANSWERSCompromised legitimate websites
Why is it safe to conduct static analysis? - CORRECT-ANSWERSThe
investigator does not install or execute the suspect file.
,In Port Monitoring, the following command is used to look for connections
established to unknown or suspicious IP addresses. - CORRECT-
ANSWERSNetstat -an
What is NOT one of CAN-SPAM's main requirements for senders? - CORRECT-
ANSWERSHonor recipients opt-out request within 30 business days.
Which is a violation of the Controlling the Assault of Non-Solicited
Pornography and Marketing Act? - CORRECT-ANSWERSRetransmitting spam
messages through a computer to mislead others about the origin of the
message.
What is the first step an investigator should take to carry out the on-site
examination of an email server? - CORRECT-ANSWERSObtain a search
warrant application in the appropriate language.
What is the primary information required for starting an email investigation?
- CORRECT-ANSWERSThe unique IP address.
What is NOT true of email crimes? - CORRECT-ANSWERSEmail crime is not
limited by the email organization.
Which RFC defines normal email communication? - CORRECT-ANSWERSRFC
5322
Which of the following is an internet protocol that's designed for transmitting
email over IP networks? - CORRECT-ANSWERSSimple Mail Transfer Protocol
(SMTP)
Where do email archives store received and sent emails? - CORRECT-
ANSWERSOn the system hard drive.
An email client connects with a POP3 server via which of the following? -
CORRECT-ANSWERSPort 110.
What is considered the biggest threat to mobile devices? - CORRECT-
ANSWERSData loss.
Which architectural layer of mobile device environments represents any
program that runs on the Android platform? - CORRECT-ANSWERSClient
application
Which architectural layer of mobile device environments simplifies the
process of interacting with web services and other applications such as
email, internet, and SMS? - CORRECT-ANSWERSCommunication API
, Which architectural layer of mobile device environments is responsible for
creating menus and sub-menus in designing applications? - CORRECT-
ANSWERSGUI API
Which architectural layer of mobile device environments provides telephony
service related to the mobile carrier operator such as making calls, receiving
call, and SMS? - CORRECT-ANSWERSPhone API
Which architectural layer of mobile device environments offers utilities for
scheduling multiple tasks, memory management tasks, synchronization, and
priority allocation? - CORRECT-ANSWERSOperating system.
Which architectural layer of mobile device environments contains items that
are responsible for mobile operations - such as a display device, keypad,
RAM, flash, embedded processor, and media processor? - CORRECT-
ANSWERSHardware
Which architectural layer of mobile device environments allow a mobile
device to communicate with the network? - CORRECT-ANSWERSNetwork
What operating system was Android based on? - CORRECT-ANSWERSLinux
Identify which code can be used to obtain the International Mobile Equipment
Identifier (IMEI) number on a mobile phone. - CORRECT-ANSWERS*#06#
Which of the following is a unique 32-bit identifier recorded on a secure chip
in a mobile phone by the manufacturer? - CORRECT-ANSWERSElectronic
Serial Number (ESN)
The mobile forensics investigation team should consist of person who have
expertise in responding, seizing, collecting, and reporting the evidence from
the mobile devices. - CORRECT-ANSWERSTrue.
How should expert witnesses conduct themselves while presenting testimony
to any court or attorney? - CORRECT-ANSWERSAvoid leaning and develop
self-confidence.
Which statement is correct about who attends a trial or deposition? -
CORRECT-ANSWERSBoth attorneys are present in a deposition.
Which of the following standards is a legal precedent regarding the
admissibility of scientific examinations or experiments in legal cases? -
CORRECT-ANSWERSFrye Standard.
The main objective of a cybercrime investigation is to identify which of the
following? - CORRECT-ANSWERSEvidence and facts.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Elitaa. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $17.99. You're not tied to anything after your purchase.