100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
WGU C840 Digital Forensics in Cybersecurity Study guide Exam Questions with Key Marking Scheme Updated 2024/2025 $12.99   Add to cart

Exam (elaborations)

WGU C840 Digital Forensics in Cybersecurity Study guide Exam Questions with Key Marking Scheme Updated 2024/2025

 8 views  0 purchase
  • Course
  • WGU C840
  • Institution
  • WGU C840

WGU C840 Digital Forensics in Cybersecurity Study guide Exam Questions with Key Marking Scheme Updated 2024/2025 Which law requires a search warrant or one of the recognized expectations to the search warrant requirements for searching email messages on a computer A The Fourth Amendment to th...

[Show more]

Preview 4 out of 115  pages

  • September 1, 2024
  • 115
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • WGU C840
  • WGU C840
avatar-seller
KieranKent55
WGU C840 Digital Forensics in Cybersecurity Study guide Exam
Questions with Key Marking Scheme Updated 2024/2025

Which law requires a search warrant or one of the recognized expectations to the
search warrant requirements for searching email messages on a computer


A The Fourth Amendment to the U.S. Constitution
B The CAN-SPAM Act
C U.S.C 2252B
D The Communication Assistance to Law Enforcement Act - correct answer A


What is one purpose of steganography


A To decipher encrypted messages
B To prevent images from being edited
C To alter the color of a photo
D To deliver information secretly - correct answer D


Which method is used to implement steganography through pictures


A ROT13
B LSB
C MD5
D 3DES - correct answer B

,The chief information security officer of a company believes that an attacker has
infiltrated the company's network and is using steganography to communicate
with external sources. A security team is investigating the incident. They are told
to start by focusing on the core elements of steganography.


What are the core elements of steganography


A Payload, carrier, channel
B Process, intelligence, mobility
C Transport, network, data link
D Telemetry, cryptography, multiplexing - correct answer A


A system administrator believes data are being leaked from the organization. The
administrator decides to use steganography to hide tracking information in the
types of files he thinks are being leaked.


Which steganographic term describes this tracking information


A Carrier
B Payload
C Channel
D Audit - correct answer B


A criminal organization has compromised a third-party web server and is using it
to control a botnet. The botnet server hides command and control messages
through the DNS protocol.

,Which steganographic component are the command and control messages


A Carrier
B Dead drop
C Payload
D Channel - correct answer C


Which method is commonly used to hide data via steganography


A RSA
B DES
C LSB
D AES - correct answer C


A system administrator believes an employee is leaking information to a
competitor by hiding confidential data in images being attached to outgoing
emails. The administrator has captured the outgoing emails.


Which tool should the forensic investigator use to search for the hidden data in
the images


A Data Doctor
B Forensic Toolkit (FTK)
C Snow

, D Wolf - correct answer B


A foreign government is communicating with its agents in the U.S. by hiding text
messages in popular American songs, which are uploaded to the web.


Which steganographic tool can be used to do this


A Snow
B MP3Stego
C Steganophony
D QuickStego - correct answer B


During a cyber-forensics investigation, a USB drive was found that contained
multiple pictures of the same flower.


How should an investigator use properties of a file to detect steganography


A Review the properties log looking for changes compared to the original file using
a tool such as EnCase


B Review the hexadecimal code looking for anomalies in the file headers and
endings using a tool such as EnCase


C Compare the file extensions using a tool such as Windows Explorer

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller KieranKent55. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $12.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

85651 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$12.99
  • (0)
  Add to cart