Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Digital-Forensics-in-Cybersecurity Exam Dumps - Digital Forensics in Cybersecurity (D431/C840) Course Exam

Go to page:
Question # 4

Tom saved a message using the least significant bit (LSB) method in a sound file and uploaded this sound to his own website.

What is the carrier in this example?

A.

The least significant bit method

B.

Tom's website

C.

The sound file

D.

The message

Full Access
Question # 5

Which Windows 7 operating system log stores events collected from remote computers?

A.

System

B.

Application

C.

ForwardedEvents

D.

Security

Full Access
Question # 6

Which principle of evidence collection states that access to evidence must be tracked from the time it is seized through its use in court?

A.

Evidence record

B.

Chain of custody

C.

Event log

D.

Audit log

Full Access
Question # 7

A forensic investigator is acquiring evidence from an iPhone.

What should the investigator ensure before the iPhone is connected to the computer?

A.

That the phone is in jailbreak mode

B.

That the phone avoids syncing with the computer

C.

That the phone is powered off

D.

That the phone has root privilege

Full Access
Question # 8

While collecting digital evidence from a running computer involved in a cybercrime, the forensic investigator makes a list of items that need to be collected.

Which piece of digital evidence should be collected first?

A.

Security logs

B.

Chat room logs

C.

Recently accessed files

D.

Temporary Internet files

Full Access
Go to page: