100% tevredenheidsgarantie Direct beschikbaar na betaling Zowel online als in PDF Je zit nergens aan vast
logo-home
WGU C702 Forensics and Network Intrusion Final Exam Questions with Verified Answers (Updated)| Latest 2024/2025 €11,31   In winkelwagen

Tentamen (uitwerkingen)

WGU C702 Forensics and Network Intrusion Final Exam Questions with Verified Answers (Updated)| Latest 2024/2025

 9 keer bekeken  0 keer verkocht
  • Vak
  • WGU C702
  • Instelling
  • WGU C702

Company A is using Company B to host data. Company A lets Company B perform all the daily activities of managing the data. Company A's customers are unaware of the security procedures Company B uses to host the data. Which threat does this depict? Unknown risk profile During a recent scan of a...

[Meer zien]

Voorbeeld 3 van de 20  pagina's

  • 8 oktober 2024
  • 20
  • 2024/2025
  • Tentamen (uitwerkingen)
  • Vragen en antwoorden
  • WGU C702
  • WGU C702
avatar-seller
WGU C702 Forensics and Network Intrusion Final
i- i- i- i- i- i- i-




Exam Questions with Verified Answers (Updated)
i- i- i- i- i-




Company A is using Company B to host data. Company A lets Company B
i- i- i- i- i- i- i- i- i- i- i- i- i- i-



perform all the daily activities of managing the data. Company A's
i- i- i- i- i- i- i- i- i- i- i-



customers are unaware of the security procedures Company B uses to
i- i- i- i- i- i- i- i- i- i- i-



host the data. Which threat does this depict?
i- i- Unknown risk profile
i- i- i- i- i- i-i- i- i- i-




During a recent scan of a network, a network administrator sent ICMP
i- i- i- i- i- i- i- i- i- i- i- i-



echo 8 packets to each IP address being used in the network. The ICMP
i- i- i- i- i- i- i- i- i- i- i- i- i- i-



echo 8 packets contained an invalid media access control (MAC) address.
i- i- i- i- i- i- i- i- i- i- i-



Logs showed that one device replied with ICMP echo 0 packets. What
i- i- i- i- i- i- i- i- i- i- i- i-



does the reply from the single device indicate?
i- i- The machine is in i- i- i- i- i- i-i- i- i- i- i- i-



promiscuous mode. i-




A forensic investigator is performing malware analysis on a Windows
i- i- i- i- i- i- i- i- i- i-



computer. The investigator believes malware has replaced the legitimate
i- i- i- i- i- i- i- i- i-



drivers with fake versions. What should the investigator look at to
i- i- i- i- i- i- i- i- i- i- i-



confirm these suspicions?
i- The digital signatures on the drivers i- i-i- i- i- i- i- i- i-




A forensic investigator is using a hex editor to view file signatures for
i- i- i- i- i- i- i- i- i- i- i- i- i-



graphics. Which type of file is the investigator viewing when the first
i- i- i- i- i- i- i- i- i- i- i- i-



hexadecimal characters are 42 4D? BMP i- i- i- i- i-i- i-

,Where should an investigator look in the registry to find artifacts if there
i- i- i- i- i- i- i- i- i- i- i- i- i-



is malware on a Windows system?
i- i- i- i- i- i-i- i-



HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run


A forensic investigator is searching a Windows XP computer image for
i- i- i- i- i- i- i- i- i- i- i-



information about a deleted Word document. The investigator already
i- i- i- i- i- i- i- i- i-



viewed the sixth file that was deleted from the computer. Two additional
i- i- i- i- i- i- i- i- i- i- i- i-



files were deleted. What is the name of the last file the investigator
i- i- i- i- i- i- i- i- i- i- i- i- i-



opens? $R7.doc i-i- i-




Which documentation should a forensic examiner prepare prior to a
i- i- i- i- i- i- i- i- i- i-



dynamic analysis? The full path and location of the file being
i- i-i- i- i- i- i- i- i- i- i- i- i-



investigated


What allows for a lawful search to be conducted without a warrant or
i- i- i- i- i- i- i- i- i- i- i- i- i-



probable cause? Consent of person with authority
i- i-i- i- i- i- i- i-




A forensic investigator is tasked with retrieving evidence where the
i- i- i- i- i- i- i- i- i- i-



primary server has been erased. The investigator needs to rely on
i- i- i- i- i- i- i- i- i- i- i-



network logs and backup tapes to base their conclusions on while
i- i- i- i- i- i- i- i- i- i- i-



testifying in court. Which information found in rules of evidence, Rule
i- i- i- i- i- i- i- i- i- i- i-



1001, helps determine if this testimony is acceptable to the court?
i- i- i- i- i- i- i- i- i- i- i-i- i-



Definition of original evidence i- i- i-

, When can a forensic investigator collect evidence without formal
i- i- i- i- i- i- i- i- i-



consent? When properly worded banners are displayed on the
i-i- i- i- i- i- i- i- i- i- i-



computer screen i-




Who determines whether a forensic investigation should take place if a
i- i- i- i- i- i- i- i- i- i- i-



situation is undocumented in the standard operating procedures?
i- i- i- i- i- i- i- i-i- i-



Decision maker i-




Which situation leads to a civil investigation?
i- i- i- i- i- i- i-i- i- Disputes between two i- i- i-



parties that relate to a contract violation
i- i- i- i- i- i-




What is the goal for an attacker using a directory traversal attack?
i- i- i- To i- i- i- i- i- i- i- i- i-i- i- i-



access areas in the system in which the attacker should not have access
i- i- i- i- i- i- i- i- i- i- i- i-




Which rule does a forensic investigator need to follow?
i- i- i- i- i- i- i- i- i-i- i- Use well- i-



known standard procedures
i- i-




What is the focus of Locard's exchange principle?
i- i- Anyone entering a
i- i- i- i- i- i-i- i- i- i- i-



crime scene takes something with them and leaves something behind.
i- i- i- i- i- i- i- i- i-




What is the focus of the enterprise theory of investigation (ETI)?
i- i- i- i- i- i- i- i- i- i- i-i- i-



Solving one crime can tie it back to a criminal organization's activities.
i- i- i- i- i- i- i- i- i- i- i-

Voordelen van het kopen van samenvattingen bij Stuvia op een rij:

√  	Verzekerd van kwaliteit door reviews

√ Verzekerd van kwaliteit door reviews

Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!

Snel en makkelijk kopen

Snel en makkelijk kopen

Je betaalt supersnel en eenmalig met iDeal, Bancontact of creditcard voor de samenvatting. Zonder lidmaatschap.

Focus op de essentie

Focus op de essentie

Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!

Veelgestelde vragen

Wat krijg ik als ik dit document koop?

Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.

Tevredenheidsgarantie: hoe werkt dat?

Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.

Van wie koop ik deze samenvatting?

Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper AcademiaExpert. Stuvia faciliteert de betaling aan de verkoper.

Zit ik meteen vast aan een abonnement?

Nee, je koopt alleen deze samenvatting voor €11,31. Je zit daarna nergens aan vast.

Is Stuvia te vertrouwen?

4,6 sterren op Google & Trustpilot (+1000 reviews)

Afgelopen 30 dagen zijn er 73918 samenvattingen verkocht

Opgericht in 2010, al 14 jaar dé plek om samenvattingen te kopen

Start met verkopen
€11,31
  • (0)
  Kopen