100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
WGU D431 - Digital Forensics in Cybersecurity (DQO1 vocab & study guide) Graded A+ $7.99   Add to cart

Exam (elaborations)

WGU D431 - Digital Forensics in Cybersecurity (DQO1 vocab & study guide) Graded A+

 2 views  0 purchase
  • Course
  • ...
  • Institution
  • ...

WGU D431 - Digital Forensics in Cybersecurity (DQO1 vocab & study guide) Graded A+

Preview 4 out of 83  pages

  • November 8, 2024
  • 83
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • ...
  • ...
avatar-seller
stuuviaa
Name: Score:


229 Multiple choice questions

Definition 1 of 229
literally changes its form from time to time to avoid detection by antivirus software. A more
advanced form of this is called the Metamorphic virus; it can completely rewrite itself.

Polymorphic virus


Metamorphic virus

Macro virus

Armored virus

Definition 2 of 229
Protects children 13 years of age and under from the collection and use of their personal
information by websites. It replaces the Child Online Protection Act of 1988 (COPA), which was
determined to be unconstitutional.

The family educational rights and privacy act of 1974


The children's internet protection act of 2000

The Children's Online Privacy Protection Act of 1998


The digital millennium copyright act of 1998

Definition 3 of 229
A broad category of crime that can encompass many different activities, but essentially any
attempt to gain financial reward through deception.

Fraud


Identity Theft

Cyberstalking


Defamation

,Definition 4 of 229
This act covers access to a facility through which electronic communication is provided or
exceeding the access that was authorized. It is broadly written to apply to a range of offenses.
Punishment can be up to 5 years in prison and fines for the first offense. The SCA governs how
investigators can obtain stored account records and contents from network service providers,
including Internet service providers ("ISPs"), telephone companies, and cell phone service
providers. SCA issues arise often in cases involving the Internet: when investigators seek stored
information concerning Internet accounts from providers of Internet service.

Internet message access protocol (imap)

Disaster recovery plan (drp)


American standard code for information interchange (ascii)

Unlawful Access to Stored Communications (18 U.S.C. § 2701)

Term 5 of 229
What law applies to intercepting communications with the computer owner's permission?

A risk management approach to quantifying vulnerability data and then taking into account
the degree of risk to different types of systems or information.

Governs the privacy and disclosure, access, and interception of content and traffic data
related to electronic communications.

18 U.S.C. 2511 is the embodiment of the Electronic Communications Privacy Act (ECPA) of
1986 into criminal law. It is a crime to intentionally intercept, disclose, or use any wire, oral,
or electronic communication in violation of federal law.
This law applies to any person who is not a party to the communication and who
intentionally intercepts, discloses, or uses that communication without the consent of at
least one party.

Contains many provisions about recordkeeping and destruction of electronic records
relating to the management and operation of publicly held companies.

,Definition 6 of 229
The result of acquiring a file as it is being updated.

Caesar cipher

Symmetric cryptography

Slurred image


Swap file

Definition 7 of 229
attacks the computer in multiple ways—for example, infecting the boot sector of the hard disk and
one or more files.

Common virus


Worm

Boot-sector virus

Multi-partite virus

Definition 8 of 229
The last bit or least significant bit is used to store data.

Universal disk format (udf)

Asynchronous transfer mode (atm)

Least significant bit (LSB)


Base transceiver station (bts)

, Term 9 of 229
LILO (Linux Loader)

A command-line interface for linux.

One of the Linux boot loaders.

A graphical user Interface for linux.


A type of Linux file system.

Definition 10 of 229
The process of examining network traffic, including transaction logs and real-time monitoring.

Digital evidence

Expert testimony


Live system forensics

Network forensics

Definition 11 of 229
Offline analysis conducted on an evidence disk or forensic duplicate after booting from a CD or
another system.

Physical analysis

Logical analysis

Digital evidence

Volatile memory analysis

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller stuuviaa. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $7.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

75632 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$7.99
  • (0)
  Add to cart