Black Friday Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

Digital-Forensics-in-Cybersecurity Digital Forensics in Cybersecurity (D431/C840DQO1) Course Exam Questions and Answers

Questions 4

Where does Windows store passwords for local user accounts?

Options:

A.

HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles

B.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WZCSVC\Parameters\Interfaces

C.

SAM file in Windows\System32

D.

Security file in Windows\System32

Buy Now
Questions 5

Thomas received an email stating he needed to follow a link and verify his bank account information to ensure it was secure. Shortly after following the instructions, Thomas noticed money was missing from his account.

Which digital evidence should be considered to determine how Thomas' account information was compromised?

Options:

A.

Email messages

B.

Browser cache

C.

Bank transaction logs

D.

Firewall logs

Buy Now
Questions 6

A company has identified that a hacker has modified files on one of the company's computers. The IT department has collected the storage media from the hacked computer.

Which evidence should be obtained from the storage media to identify which files were modified?

Options:

A.

File timestamps

B.

Private IP addresses

C.

Public IP addresses

D.

Operating system version

Buy Now
Questions 7

Which directory contains the system's configuration files on a computer running Mac OS X?

Options:

A.

/var

B.

/bin

C.

/etc

D.

/cfg

Buy Now
Questions 8

Which information is included in an email header?

Options:

A.

Sender's MAC address

B.

Number of pages

C.

Content-Type

D.

Message-Digest

Buy Now
Questions 9

A cybercriminal hacked into an Apple iPad that belongs to a company's chief executive officer (CEO). The cybercriminal deleted some important files on the data volume that must be retrieved.

Which hidden folder will contain the digital evidence?

Options:

A.

/Private/etc

B.

/lost+found

C.

/.Trashes/501

D.

/etc

Buy Now
Questions 10

Which term describes the used space between the end of a file and the end of the last cluster assigned to the file?

Options:

A.

Unallocated space

B.

Volume slack

C.

Host protected area

D.

File slack

Buy Now
Questions 11

Which universal principle must be observed when handling digital evidence?

Options:

A.

Avoid making changes to the evidence

B.

Make a copy and analyze the original

C.

Get the signatures of two witnesses

D.

Keep the evidence in a plastic bag

Buy Now
Questions 12

A forensic investigator suspects that spyware has been installed to a Mac OS X computer by way of an update.

Which Mac OS X log or folder stores information about system and software updates?

Options:

A.

/var/spool/cups

B.

/var/log/daily.out

C.

/var/vm

D.

/Library/Receipts

Buy Now
Questions 13

On which file does the Windows operating system store hashed passwords?

Options:

A.

SAM

B.

Kerberos

C.

System

D.

NTUSER.dat

Buy Now
Questions 14

Susan was looking at her credit report and noticed that several new credit cards had been opened lately in her name. Susan has not opened any of the credit card accounts herself.

Which type of cybercrime has been perpetrated against Susan?

Options:

A.

Identity theft

B.

SQL injection

C.

Cyberstalking

D.

Malware

Buy Now
Questions 15

Which description applies to the Advanced Forensic Format (AFF)?

Options:

A.

An open file standard developed by AccessData

B.

A proprietary format used by the iLook tool

C.

An open file standard used by Sleuth Kit and Autopsy

D.

A proprietary format developed by Guidance Software

Buy Now
Questions 16

A USB flash drive was seized as evidence to be entered into a trial.

Which type of evidence is this USB flash drive?

Options:

A.

Documentary

B.

Demonstrative

C.

Testimonial

D.

Real

Buy Now
Questions 17

Which storage format is a magnetic drive?

Options:

A.

CD-ROM

B.

SATA

C.

Blu-ray

D.

SSD

Buy Now
Questions 18

A forensic scientist arrives at a crime scene to begin collecting evidence.

What is the first thing the forensic scientist should do?

Options:

A.

Seize the computer immediately

B.

Photograph all evidence in its original place

C.

Document user passwords

D.

Run antivirus scans

Buy Now
Questions 19

Which law or guideline lists the four states a mobile device can be in when data is extracted from it?

Options:

A.

Health Insurance Portability and Accountability Act (HIPAA)

B.

NIST SP 800-72 Guidelines

C.

Electronic Communications Privacy Act (ECPA)

D.

Communications Assistance to Law Enforcement Act (CALEA)

Buy Now
Questions 20

An organization is determined to prevent data leakage through steganography. It has developed a workflow that all outgoing data must pass through. The company will implement a tool as part of the workflow to check for hidden data.

Which tool should be used to check for the existence of steganographically hidden data?

Options:

A.

Data Doctor

B.

Forensic Toolkit (FTK)

C.

Snow

D.

MP3Stego

Buy Now
Questions 21

A user at a company attempts to hide the combination to a safe that stores confidential information in a data file called vacationdetails.doc.

What is vacationdetails.doc called, in steganographic terms?

Options:

A.

Payload

B.

Snow

C.

Carrier

D.

Channel

Buy Now
Questions 22

Which U.S. law criminalizes the act of knowingly using a misleading domain name with the intent to deceive a minor into viewing harmful material?

Options:

A.

Communications Assistance to Law Enforcement Act (CALEA)

B.

18 U.S.C. 2252B

C.

The Privacy Protection Act (PPA)

D.

Electronic Communications Privacy Act (ECPA)

Buy Now
Questions 23

Which characteristic applies to solid-state drives (SSDs) compared to magnetic drives?

Options:

A.

They are less susceptible to damage

B.

They have moving parts

C.

They are generally slower

D.

They have a lower cost per gigabyte

Buy Now
Exam Name: Digital Forensics in Cybersecurity (D431/C840DQO1) Course Exam
Last Update: Nov 23, 2025
Questions: 79
Digital-Forensics-in-Cybersecurity pdf

Digital-Forensics-in-Cybersecurity PDF

$25.5  $84.99
Digital-Forensics-in-Cybersecurity Engine

Digital-Forensics-in-Cybersecurity Testing Engine

$30  $99.99
Digital-Forensics-in-Cybersecurity PDF + Engine

Digital-Forensics-in-Cybersecurity PDF + Testing Engine

$40.5  $134.99