100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
2024 WGU C702 CHFI AND OA EXAM WITH CORRECT ANSWERS $17.99   Add to cart

Exam (elaborations)

2024 WGU C702 CHFI AND OA EXAM WITH CORRECT ANSWERS

 6 views  0 purchase
  • Course
  • WGU C702 CHFI AND OA
  • Institution
  • WGU C702 CHFI AND OA

2024 WGU C702 CHFI AND OA EXAM WITH CORRECT ANSWERS

Preview 3 out of 18  pages

  • October 17, 2024
  • 18
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • WGU C702 CHFI AND OA
  • WGU C702 CHFI AND OA
avatar-seller
Elitaa
2024 WGU C702 CHFI AND OA
EXAM WITH CORRECT ANSWERS



Which of the following is true regarding computer forensics? - CORRECT-
ANSWERSComputer forensics deals with the process of finding evidence
related to a digital crime to find the culprits and initiate legal action against
them.

Which of the following is NOT a objective of computer forensics? - CORRECT-
ANSWERSDocument vulnerabilities allowing further loss of intellectual
property, finances, and reputation during an attack.

What is a common technique used to distribute malware on the web with
tactics such as keyword stuffing, doorway pages, page swapping, and adding
unrelated keywords to get higher search engine ranking for malware pages?
- CORRECT-ANSWERSBlackhat SEO

What is a common technique used to distribute malware on the web by
mimicking legitimate institutions in an attempt to steal passwords, credit
cards, and account data? - CORRECT-ANSWERSSpear phishing sites

What is a common technique used to distribute malware on the web by
embedding malware-laden advertisements in authentic online advertising
channels to spread onto systems of unsuspecting users? - CORRECT-
ANSWERSMalvertising

What is a common technique used to distribute malware on the web when an
attacker exploits flaws in browser software to install malware just by merely
visiting a website? - CORRECT-ANSWERSDrive by downloads

When a reputable website is infected with malware that secretly installs itself
on a visitor's system and thereafter carries out malicious activities, it is an
example of which common technique used by hackers to distribute malware?
- CORRECT-ANSWERSCompromised legitimate websites

Why is it safe to conduct static analysis? - CORRECT-ANSWERSThe
investigator does not install or execute the suspect file.

,In Port Monitoring, the following command is used to look for connections
established to unknown or suspicious IP addresses. - CORRECT-
ANSWERSNetstat -an

What is NOT one of CAN-SPAM's main requirements for senders? - CORRECT-
ANSWERSHonor recipients opt-out request within 30 business days.

Which is a violation of the Controlling the Assault of Non-Solicited
Pornography and Marketing Act? - CORRECT-ANSWERSRetransmitting spam
messages through a computer to mislead others about the origin of the
message.

What is the first step an investigator should take to carry out the on-site
examination of an email server? - CORRECT-ANSWERSObtain a search
warrant application in the appropriate language.

What is the primary information required for starting an email investigation?
- CORRECT-ANSWERSThe unique IP address.

What is NOT true of email crimes? - CORRECT-ANSWERSEmail crime is not
limited by the email organization.

Which RFC defines normal email communication? - CORRECT-ANSWERSRFC
5322

Which of the following is an internet protocol that's designed for transmitting
email over IP networks? - CORRECT-ANSWERSSimple Mail Transfer Protocol
(SMTP)

Where do email archives store received and sent emails? - CORRECT-
ANSWERSOn the system hard drive.

An email client connects with a POP3 server via which of the following? -
CORRECT-ANSWERSPort 110.

What is considered the biggest threat to mobile devices? - CORRECT-
ANSWERSData loss.

Which architectural layer of mobile device environments represents any
program that runs on the Android platform? - CORRECT-ANSWERSClient
application

Which architectural layer of mobile device environments simplifies the
process of interacting with web services and other applications such as
email, internet, and SMS? - CORRECT-ANSWERSCommunication API

, Which architectural layer of mobile device environments is responsible for
creating menus and sub-menus in designing applications? - CORRECT-
ANSWERSGUI API

Which architectural layer of mobile device environments provides telephony
service related to the mobile carrier operator such as making calls, receiving
call, and SMS? - CORRECT-ANSWERSPhone API

Which architectural layer of mobile device environments offers utilities for
scheduling multiple tasks, memory management tasks, synchronization, and
priority allocation? - CORRECT-ANSWERSOperating system.

Which architectural layer of mobile device environments contains items that
are responsible for mobile operations - such as a display device, keypad,
RAM, flash, embedded processor, and media processor? - CORRECT-
ANSWERSHardware

Which architectural layer of mobile device environments allow a mobile
device to communicate with the network? - CORRECT-ANSWERSNetwork

What operating system was Android based on? - CORRECT-ANSWERSLinux

Identify which code can be used to obtain the International Mobile Equipment
Identifier (IMEI) number on a mobile phone. - CORRECT-ANSWERS*#06#

Which of the following is a unique 32-bit identifier recorded on a secure chip
in a mobile phone by the manufacturer? - CORRECT-ANSWERSElectronic
Serial Number (ESN)

The mobile forensics investigation team should consist of person who have
expertise in responding, seizing, collecting, and reporting the evidence from
the mobile devices. - CORRECT-ANSWERSTrue.

How should expert witnesses conduct themselves while presenting testimony
to any court or attorney? - CORRECT-ANSWERSAvoid leaning and develop
self-confidence.

Which statement is correct about who attends a trial or deposition? -
CORRECT-ANSWERSBoth attorneys are present in a deposition.

Which of the following standards is a legal precedent regarding the
admissibility of scientific examinations or experiments in legal cases? -
CORRECT-ANSWERSFrye Standard.

The main objective of a cybercrime investigation is to identify which of the
following? - CORRECT-ANSWERSEvidence and facts.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Elitaa. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $17.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

85169 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$17.99
  • (0)
  Add to cart