Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Digital-Forensics-in-Cybersecurity Exam Dumps - Digital Forensics in Cybersecurity (D431/C840) Course Exam

Go to page:
Question # 9

A user at a company attempts to hide the combination to a safe that stores confidential information in a data file called vacationdetails.doc.

What is vacationdetails.doc called, in steganographic terms?

A.

Payload

B.

Snow

C.

Carrier

D.

Channel

Full Access
Question # 10

A cybercriminal hacked into an Apple iPad that belongs to a company's chief executive officer (CEO). The cybercriminal deleted some important files on the data volume that must be retrieved.

Which hidden folder will contain the digital evidence?

A.

/Private/etc

B.

/lost+found

C.

/.Trashes/501

D.

/etc

Full Access
Question # 11

Susan was looking at her credit report and noticed that several new credit cards had been opened lately in her name. Susan has not opened any of the credit card accounts herself.

Which type of cybercrime has been perpetrated against Susan?

A.

Identity theft

B.

SQL injection

C.

Cyberstalking

D.

Malware

Full Access
Question # 12

What is one purpose of steganography?

A.

To encrypt data for security

B.

To deliver information secretly

C.

To compress large files

D.

To delete files securely

Full Access
Question # 13

A USB flash drive was seized as evidence to be entered into a trial.

Which type of evidence is this USB flash drive?

A.

Documentary

B.

Demonstrative

C.

Testimonial

D.

Real

Full Access
Question # 14

Which forensics tool can be used to bypass the passcode of an Apple iPhone running the iOS operating system?

A.

iStumbler

B.

Ophcrack

C.

LOphtCrack

D.

XRY

Full Access
Question # 15

A computer involved in a crime is infected with malware. The computer is on and connected to the company's network. The forensic investigator arrives at the scene.

Which action should be the investigator's first step?

A.

Turn off the computer

B.

Unplug the computer's Ethernet cable

C.

Run malware removal tools

D.

Copy files to external media

Full Access
Question # 16

Which law requires both parties to consent to the recording of a conversation?

A.

Health Insurance Portability and Accountability Act (HIPAA)

B.

Electronic Communications Privacy Act (ECPA)

C.

Wiretap Act

D.

Stored Communications Act

Full Access
Go to page: