WGU C702 CHFI and OA EXAM QUESTIONS AND ANSWERS
Which of the following is true regarding computer forensics? - ANSWER -Computer forensics deals
... [Show More] with the process of finding evidence related to a digital crime to find the culprits and initiate legal action against them.
Which of the following is NOT a objective of computer forensics? - ANSWER -Document vulnerabilities allowing further loss of intellectual property, finances, and reputation during an attack.
Which of the following is true regarding Enterprise Theory of Investigation (ETI)? - ANSWER -It adopts a holistic approach toward any criminal activity as a criminal operation rather as a single criminal act.
Forensic readiness refers to: - ANSWER -An organization's ability to make optimal use of digital evidence in a limited time period and with minimal investigation costs.
Which of the following is NOT a element of cybercrime? - ANSWER -Evidence smaller in size.
Which of the following is true of cybercrimes? - ANSWER -Investigators, with a warrant, have the authority to forcibly seize the computing devices.
Which of the following is true of cybercrimes? - ANSWER -The initial reporting of the evidence is usually informal.
Which of the following is NOT a consideration during a cybercrime investigation? - ANSWER -Value or cost to the victim.
Which of the following is a user-created source of potential evidence? - ANSWER -Address book.
Which of the following is a computer-created source of potential evidence? - ANSWER -Swap file.
Which of the following is NOT where potential evidence may be located? - ANSWER -Processor.
Under which of the following conditions will duplicate evidence NOT suffice? - ANSWER -When original evidence is in possession of the originator.
Which of the following Federal Rules of Evidence governs proceedings in the courts of the United States? - ANSWER -Rule 101.
Which of the following Federal Rules of Evidence ensures that the truth may be ascertained and the proceedings justly determined? - ANSWER -Rule 102.
Which of the following Federal Rules of Evidence contains rulings on evidence? - ANSWER -Rule 103
Which of the following Federal Rules of Evidence states that the court shall restrict the evidence to its proper scope and instruct the jury accordingly? - ANSWER -Rule 105
Which of the following refers to a set of methodological procedures and techniques to identify, gather, preserve, extract, interpret, document, and present evidence from computing equipment in such a manner that the discovered evidence is acceptable during a legal and/or administrative proceeding in a court of law? - ANSWER -Computer Forensics.
Computer Forensics deals with the process of finding _____ related to a digital crime to find the culprits and initiate legal action against them. - ANSWER -Evidence.
Minimizing the tangible and intangible losses to the organization or an individual is considered an essential computer forensics use. - ANSWER -True.
Cybercrimes can be classified into the following two types of attacks, based on the line of attack. - ANSWER -Internal and External.
Espionage, theft of intellectual property, manipulation of records, and trojan horse attacks are examples of what? - ANSWER -Insider attack or primary attacks.
External attacks occur when there are inadequate information-security policies and procedures. - ANSWER -True.
Which type of cases involve disputes between two parties? - ANSWER -Civil.
A computer forensic examiner can investigate any crime as long as he or she takes detailed notes and follows the appropriate processes. - ANSWER -False.
________ is the standard investigative model used by the FBI when conducting investigations against major criminal organizations. - ANSWER -Enterprise Theory of Investigation (ETI).
Forensic readiness includes technical and nontechnical actions that maximize an organization's competence to use digital evidence. - ANSWER -True.
Which of the follow [Show Less]