Package deal
WGU C840 PACKAGE DEAL ALL WITH 100% CORRECT ANSWERS
WGU C840 PACKAGE DEAL ALL WITH 100% CORRECT ANSWERS
[Show more]WGU C840 PACKAGE DEAL ALL WITH 100% CORRECT ANSWERS
[Show more]WGU Course C840 - Digital Forensics in Cybersecurity Quizlet by Brian MacFarlane |272 questions and answers
Preview 4 out of 108 pages
Add to cartWGU Course C840 - Digital Forensics in Cybersecurity Quizlet by Brian MacFarlane |272 questions and answers
expert report 
A formal document prepared by a forensics specialist to document an investigation, including a list of all tests conducted as well as the specialist's own curriculum vitae (CV). Anything the specialist plans to testify about at a trial must be included in the expert report. 
 
 
 
Te...
Preview 3 out of 23 pages
Add to cartexpert report 
A formal document prepared by a forensics specialist to document an investigation, including a list of all tests conducted as well as the specialist's own curriculum vitae (CV). Anything the specialist plans to testify about at a trial must be included in the expert report. 
 
 
 
Te...
Malware forensics is also known as internet forensics. 
 
A True 
B False 
B 
 
 
 
The Privacy Protection Act (PPA) of 1980 protects journalists from being required to turn over to law enforcement any work product or documentary material, including sources, before it is disseminated to the public. ...
Preview 3 out of 23 pages
Add to cartMalware forensics is also known as internet forensics. 
 
A True 
B False 
B 
 
 
 
The Privacy Protection Act (PPA) of 1980 protects journalists from being required to turn over to law enforcement any work product or documentary material, including sources, before it is disseminated to the public. ...
The Federal Privacy Act of 1974 
Establishes a code of information-handling practices that governs the collection, maintenance, use, and dissemination of information about individuals that is maintained in systems of records by U.S. federal agencies. A system of records is a group of records under t...
Preview 1 out of 3 pages
Add to cartThe Federal Privacy Act of 1974 
Establishes a code of information-handling practices that governs the collection, maintenance, use, and dissemination of information about individuals that is maintained in systems of records by U.S. federal agencies. A system of records is a group of records under t...
The Computer Security Act of 1987 
Passed to improve the security and privacy of sensitive information in federal computer systems. The law requires the establishment of minimum acceptable security practices, creation of computer security plans, and training of system users or owners of facilities t...
Preview 1 out of 4 pages
Add to cartThe Computer Security Act of 1987 
Passed to improve the security and privacy of sensitive information in federal computer systems. The law requires the establishment of minimum acceptable security practices, creation of computer security plans, and training of system users or owners of facilities t...
The chief information officer of an accounting firm believes sensitive data is being exposed on the local network. 
 
Which tool should the IT staff use to gather digital evidence about this security vulnerability? 
Sniffer 
 
 
 
A police detective investigating a threat traces the source to a hous...
Preview 2 out of 8 pages
Add to cartThe chief information officer of an accounting firm believes sensitive data is being exposed on the local network. 
 
Which tool should the IT staff use to gather digital evidence about this security vulnerability? 
Sniffer 
 
 
 
A police detective investigating a threat traces the source to a hous...
Which U.S. law criminalizes the act of knowingly using a misleading domain name with the intent to deceive a minor into viewing harmful material? 
 
A 18 U.S.C. 2252B 
B CAN-SPAM Act 
C Communications Decency Act 
D Children's Online Privacy Protection Act (COPPA) 
A 
 
 
 
Which U.S. law protects ...
Preview 2 out of 13 pages
Add to cartWhich U.S. law criminalizes the act of knowingly using a misleading domain name with the intent to deceive a minor into viewing harmful material? 
 
A 18 U.S.C. 2252B 
B CAN-SPAM Act 
C Communications Decency Act 
D Children's Online Privacy Protection Act (COPPA) 
A 
 
 
 
Which U.S. law protects ...
WGU C840 EXAM |335 QUESTIONS AND ANSWERS.
Preview 4 out of 36 pages
Add to cartWGU C840 EXAM |335 QUESTIONS AND ANSWERS.
Business Continuity Plan (BCP) 
A plan for maintaining minimal operations until the business can return to full normal operations. 
 
 
 
Disaster Recovery Plan (DRP) 
A plan for returning the business to full normal operations. 
 
 
 
International Organization for Standardization (ISO) 27001 stand...
Preview 4 out of 32 pages
Add to cartBusiness Continuity Plan (BCP) 
A plan for maintaining minimal operations until the business can return to full normal operations. 
 
 
 
Disaster Recovery Plan (DRP) 
A plan for returning the business to full normal operations. 
 
 
 
International Organization for Standardization (ISO) 27001 stand...
The Computer Security Act of 1987 
Passed to improve the security and privacy of sensitive information in federal computer systems. The law requires the establishment of minimum acceptable security practices, creation of computer security plans, and training of system users or owners of facilities t...
Preview 1 out of 2 pages
Add to cartThe Computer Security Act of 1987 
Passed to improve the security and privacy of sensitive information in federal computer systems. The law requires the establishment of minimum acceptable security practices, creation of computer security plans, and training of system users or owners of facilities t...
The most common computer hard drives today are __________. 
SATA 
 
 
 
A __________ is used to send a test packet, or echo packet, to a machine to determine if the machine is reachable and how long the packet takes to reach the machine. 
ping 
 
 
 
Suspects often overwhelm forensic analysts with f...
Preview 2 out of 11 pages
Add to cartThe most common computer hard drives today are __________. 
SATA 
 
 
 
A __________ is used to send a test packet, or echo packet, to a machine to determine if the machine is reachable and how long the packet takes to reach the machine. 
ping 
 
 
 
Suspects often overwhelm forensic analysts with f...
Which tool should the IT staff use to gather digital evidence about this security vulnerability? 
Sniffer 
 
 
 
A police detective investigating a threat traces the source to a house. The couple at the house shows the detective the only computer the family owns, which is in their son's bedroom. Th...
Preview 2 out of 10 pages
Add to cartWhich tool should the IT staff use to gather digital evidence about this security vulnerability? 
Sniffer 
 
 
 
A police detective investigating a threat traces the source to a house. The couple at the house shows the detective the only computer the family owns, which is in their son's bedroom. Th...
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Stuvia is a marketplace, so you are not buying this document from us, but from seller BRAINBOOSTERS. Stuvia facilitates payment to the seller.
No, you only buy these notes for $35.49. You're not tied to anything after your purchase.
4.6 stars on Google & Trustpilot (+1000 reviews)
67096 documents were sold in the last 30 days
Founded in 2010, the go-to place to buy study notes for 14 years now