{"id":115477,"date":"2025-11-28T03:14:04","date_gmt":"2025-11-28T03:14:04","guid":{"rendered":"https:\/\/www.dumpsbase.com\/freedumps\/?p=115477"},"modified":"2025-11-28T03:14:04","modified_gmt":"2025-11-28T03:14:04","slug":"wgu-digital-forensics-in-cybersecurity-dumps-v8-02-good-study-resources-for-starting-your-wgu-digital-forensics-in-cybersecurity-exam-course","status":"publish","type":"post","link":"https:\/\/www.dumpsbase.com\/freedumps\/wgu-digital-forensics-in-cybersecurity-dumps-v8-02-good-study-resources-for-starting-your-wgu-digital-forensics-in-cybersecurity-exam-course.html","title":{"rendered":"WGU Digital Forensics in Cybersecurity Dumps (V8.02): Good Study Resources for Starting Your WGU Digital Forensics in Cybersecurity Exam Course"},"content":{"rendered":"<p>It must be clear that the Digital Forensics in Cybersecurity is a WGU exam course that explores the specialised field of digital forensics as it applies to cybersecurity. It teaches you how to investigate cybercrimes, preserve evidence, analyse breaches, and prepare findings for legal or organisational actions. However, preparing for the Digital Forensics in Cybersecurity exam is a difficult task unless you have a good study resource. DumpsBase offers the newest <a href=\"https:\/\/www.dumpsbase.com\/wgu.html\"><em><strong>WGU<\/strong><\/em><\/a> Digital Forensics in Cybersecurity dumps (V8.02) with 74 practice exam questions and answers. By learning these real Q&amp;As and following a well-structured plan, you can approach the WGU Digital Forensics in Cybersecurity certification path with complete confidence. Choose DumpsBase now. Read each WGU Digital Forensics in Cybersecurity question carefully and manage your time wisely. Confidence comes from preparation with dedicated study supported by DumpsBase. You will walk into the Digital Forensics in Cybersecurity exam well-prepared and assured.<\/p>\n<h2>Start learning our <span style=\"background-color: #ffff99;\"><em>Digital Forensics in Cybersecurity free dumps below<\/em><\/span> to check the quality:<\/h2>\n<script>\n\t  window.fbAsyncInit = function() {\n\t    FB.init({\n\t      appId            : '622169541470367',\n\t      autoLogAppEvents : true,\n\t      xfbml            : true,\n\t      version          : 'v3.1'\n\t    });\n\t  };\n\t\n\t  (function(d, s, id){\n\t     var js, fjs = d.getElementsByTagName(s)[0];\n\t     if (d.getElementById(id)) {return;}\n\t     js = d.createElement(s); js.id = id;\n\t     js.src = \"https:\/\/connect.facebook.net\/en_US\/sdk.js\";\n\t     fjs.parentNode.insertBefore(js, fjs);\n\t   }(document, 'script', 'facebook-jssdk'));\n\t<\/script><script type=\"text\/javascript\" >\ndocument.addEventListener(\"DOMContentLoaded\", function(event) { \nif(!window.jQuery) alert(\"The important jQuery library is not properly loaded in your site. Your WordPress theme is probably missing the essential wp_head() call. You can switch to another theme and you will see that the plugin works fine and this notice disappears. If you are still not sure what to do you can contact us for help.\");\n});\n<\/script>  \n  \n<div  id=\"watupro_quiz\" class=\"quiz-area single-page-quiz\">\n<p id=\"submittingExam11257\" style=\"display:none;text-align:center;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/img\/loading.gif\" width=\"16\" height=\"16\"><\/p>\n\n<div class=\"watupro-exam-description\" id=\"description-quiz-11257\"><\/div>\n\n<form action=\"\" method=\"post\" class=\"quiz-form\" id=\"quiz-11257\"  enctype=\"multipart\/form-data\" >\n<div class='watu-question ' id='question-1' style=';'><div id='questionWrap-1'  class='   watupro-question-id-442608'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>1. <\/span>An organization has identified a system breach and has collected volatile data from the system. <br \/>\r<br>Which evidence type should be collected next?<\/div><input type='hidden' name='question_id[]' id='qID_1' value='442608' \/><input type='hidden' id='answerType442608' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442608[]' id='answer-id-1712514' class='answer   answerof-442608 ' value='1712514'   \/><label for='answer-id-1712514' id='answer-label-1712514' class=' answer'><span>Running processes<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442608[]' id='answer-id-1712515' class='answer   answerof-442608 ' value='1712515'   \/><label for='answer-id-1712515' id='answer-label-1712515' class=' answer'><span>Network connections<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442608[]' id='answer-id-1712516' class='answer   answerof-442608 ' value='1712516'   \/><label for='answer-id-1712516' id='answer-label-1712516' class=' answer'><span>Temporary data<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442608[]' id='answer-id-1712517' class='answer   answerof-442608 ' value='1712517'   \/><label for='answer-id-1712517' id='answer-label-1712517' class=' answer'><span>File timestamps<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-2' style=';'><div id='questionWrap-2'  class='   watupro-question-id-442609'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>2. <\/span>A forensic scientist is examining a computer for possible evidence of a cybercrime. <br \/>\r<br>Why should the forensic scientist copy files at the bit level instead of the OS level when copying files from the computer to a forensic computer?<\/div><input type='hidden' name='question_id[]' id='qID_2' value='442609' \/><input type='hidden' id='answerType442609' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442609[]' id='answer-id-1712518' class='answer   answerof-442609 ' value='1712518'   \/><label for='answer-id-1712518' id='answer-label-1712518' class=' answer'><span>Copying files at the OS level fails to copy deleted files or slack space.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442609[]' id='answer-id-1712519' class='answer   answerof-442609 ' value='1712519'   \/><label for='answer-id-1712519' id='answer-label-1712519' class=' answer'><span>Copying files at the OS level takes too long to be practical.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442609[]' id='answer-id-1712520' class='answer   answerof-442609 ' value='1712520'   \/><label for='answer-id-1712520' id='answer-label-1712520' class=' answer'><span>Copying files at the OS level changes the timestamp of the files.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442609[]' id='answer-id-1712521' class='answer   answerof-442609 ' value='1712521'   \/><label for='answer-id-1712521' id='answer-label-1712521' class=' answer'><span>Copying files at the OS level will copy extra information that is unnecessary.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-3' style=';'><div id='questionWrap-3'  class='   watupro-question-id-442610'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>3. <\/span>Which operating system creates a swap file to temporarily store information from memory on the hard drive when needed?<\/div><input type='hidden' name='question_id[]' id='qID_3' value='442610' \/><input type='hidden' id='answerType442610' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442610[]' id='answer-id-1712522' class='answer   answerof-442610 ' value='1712522'   \/><label for='answer-id-1712522' id='answer-label-1712522' class=' answer'><span>Linux<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442610[]' id='answer-id-1712523' class='answer   answerof-442610 ' value='1712523'   \/><label for='answer-id-1712523' id='answer-label-1712523' class=' answer'><span>Mac<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442610[]' id='answer-id-1712524' class='answer   answerof-442610 ' value='1712524'   \/><label for='answer-id-1712524' id='answer-label-1712524' class=' answer'><span>Unix<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442610[]' id='answer-id-1712525' class='answer   answerof-442610 ' value='1712525'   \/><label for='answer-id-1712525' id='answer-label-1712525' class=' answer'><span>Windows<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-4' style=';'><div id='questionWrap-4'  class='   watupro-question-id-442611'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>4. <\/span>A cybercriminal hacked into an Apple iPad that belongs to a company's chief executive officer (CEO). <br \/>\r<br>The cybercriminal deleted some important files on the data volume that must be retrieved. <br \/>\r<br>Which hidden folder will contain the digital evidence?<\/div><input type='hidden' name='question_id[]' id='qID_4' value='442611' \/><input type='hidden' id='answerType442611' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442611[]' id='answer-id-1712526' class='answer   answerof-442611 ' value='1712526'   \/><label for='answer-id-1712526' id='answer-label-1712526' class=' answer'><span>\/Private\/etc<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442611[]' id='answer-id-1712527' class='answer   answerof-442611 ' value='1712527'   \/><label for='answer-id-1712527' id='answer-label-1712527' class=' answer'><span>\/lost+found<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442611[]' id='answer-id-1712528' class='answer   answerof-442611 ' value='1712528'   \/><label for='answer-id-1712528' id='answer-label-1712528' class=' answer'><span>\/.Trashes\/501<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442611[]' id='answer-id-1712529' class='answer   answerof-442611 ' value='1712529'   \/><label for='answer-id-1712529' id='answer-label-1712529' class=' answer'><span>\/etc<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-5' style=';'><div id='questionWrap-5'  class='   watupro-question-id-442612'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>5. <\/span>A forensic investigator needs to know which file type to look for in order to find emails from a specific client. <br \/>\r<br>Which file extension is used by Eudora?<\/div><input type='hidden' name='question_id[]' id='qID_5' value='442612' \/><input type='hidden' id='answerType442612' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442612[]' id='answer-id-1712530' class='answer   answerof-442612 ' value='1712530'   \/><label for='answer-id-1712530' id='answer-label-1712530' class=' answer'><span>.dbx<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442612[]' id='answer-id-1712531' class='answer   answerof-442612 ' value='1712531'   \/><label for='answer-id-1712531' id='answer-label-1712531' class=' answer'><span>.ost<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442612[]' id='answer-id-1712532' class='answer   answerof-442612 ' value='1712532'   \/><label for='answer-id-1712532' id='answer-label-1712532' class=' answer'><span>.pst<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442612[]' id='answer-id-1712533' class='answer   answerof-442612 ' value='1712533'   \/><label for='answer-id-1712533' id='answer-label-1712533' class=' answer'><span>.mbx<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-6' style=';'><div id='questionWrap-6'  class='   watupro-question-id-442613'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>6. <\/span>Where does Windows store passwords for local user accounts?<\/div><input type='hidden' name='question_id[]' id='qID_6' value='442613' \/><input type='hidden' id='answerType442613' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442613[]' id='answer-id-1712534' class='answer   answerof-442613 ' value='1712534'   \/><label for='answer-id-1712534' id='answer-label-1712534' class=' answer'><span>HKLMSOFTWAREMicrosoftWindows NTCurrentVersionNetworkListProfiles<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442613[]' id='answer-id-1712535' class='answer   answerof-442613 ' value='1712535'   \/><label for='answer-id-1712535' id='answer-label-1712535' class=' answer'><span>HKEY_LOCAL_MACHINESOFTWAREMicrosoftWZCSVCParametersInterfaces<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442613[]' id='answer-id-1712536' class='answer   answerof-442613 ' value='1712536'   \/><label for='answer-id-1712536' id='answer-label-1712536' class=' answer'><span>SAM file in WindowsSystem32<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442613[]' id='answer-id-1712537' class='answer   answerof-442613 ' value='1712537'   \/><label for='answer-id-1712537' id='answer-label-1712537' class=' answer'><span>Security file in WindowsSystem32<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-7' style=';'><div id='questionWrap-7'  class='   watupro-question-id-442614'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>7. <\/span>A forensic investigator needs to identify where email messages are stored on a Microsoft Exchange server. <br \/>\r<br>Which file extension is used by Exchange email servers to store the mailbox database?<\/div><input type='hidden' name='question_id[]' id='qID_7' value='442614' \/><input type='hidden' id='answerType442614' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442614[]' id='answer-id-1712538' class='answer   answerof-442614 ' value='1712538'   \/><label for='answer-id-1712538' id='answer-label-1712538' class=' answer'><span>.edb<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442614[]' id='answer-id-1712539' class='answer   answerof-442614 ' value='1712539'   \/><label for='answer-id-1712539' id='answer-label-1712539' class=' answer'><span>.nsf<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442614[]' id='answer-id-1712540' class='answer   answerof-442614 ' value='1712540'   \/><label for='answer-id-1712540' id='answer-label-1712540' class=' answer'><span>.mail<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442614[]' id='answer-id-1712541' class='answer   answerof-442614 ' value='1712541'   \/><label for='answer-id-1712541' id='answer-label-1712541' class=' answer'><span>.db<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-8' style=';'><div id='questionWrap-8'  class='   watupro-question-id-442615'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>8. <\/span>A forensic investigator wants to collect evidence from a file created by a Macintosh computer running OS X 10.8. <br \/>\r<br>Which file type can be created by this OS?<\/div><input type='hidden' name='question_id[]' id='qID_8' value='442615' \/><input type='hidden' id='answerType442615' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442615[]' id='answer-id-1712542' class='answer   answerof-442615 ' value='1712542'   \/><label for='answer-id-1712542' id='answer-label-1712542' class=' answer'><span>ReiserFS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442615[]' id='answer-id-1712543' class='answer   answerof-442615 ' value='1712543'   \/><label for='answer-id-1712543' id='answer-label-1712543' class=' answer'><span>MFS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442615[]' id='answer-id-1712544' class='answer   answerof-442615 ' value='1712544'   \/><label for='answer-id-1712544' id='answer-label-1712544' class=' answer'><span>HFS+<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442615[]' id='answer-id-1712545' class='answer   answerof-442615 ' value='1712545'   \/><label for='answer-id-1712545' id='answer-label-1712545' class=' answer'><span>NTFS<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-9' style=';'><div id='questionWrap-9'  class='   watupro-question-id-442616'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>9. <\/span>1.An organization believes that a company-owned mobile phone has been compromised. <br \/>\r<br>Which software should be used to collect an image of the phone as digital evidence?<\/div><input type='hidden' name='question_id[]' id='qID_9' value='442616' \/><input type='hidden' id='answerType442616' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442616[]' id='answer-id-1712546' class='answer   answerof-442616 ' value='1712546'   \/><label for='answer-id-1712546' id='answer-label-1712546' class=' answer'><span>PTFinder<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442616[]' id='answer-id-1712547' class='answer   answerof-442616 ' value='1712547'   \/><label for='answer-id-1712547' id='answer-label-1712547' class=' answer'><span>Forensic SIM Cloner<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442616[]' id='answer-id-1712548' class='answer   answerof-442616 ' value='1712548'   \/><label for='answer-id-1712548' id='answer-label-1712548' class=' answer'><span>Forensic Toolkit (FTK)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442616[]' id='answer-id-1712549' class='answer   answerof-442616 ' value='1712549'   \/><label for='answer-id-1712549' id='answer-label-1712549' class=' answer'><span>Data Doctor<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-10' style=';'><div id='questionWrap-10'  class='   watupro-question-id-442617'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>10. <\/span>A forensic investigator suspects that spyware has been installed to a Mac OS X computer by way of an update. <br \/>\r<br>Which Mac OS X log or folder stores information about system and software updates?<\/div><input type='hidden' name='question_id[]' id='qID_10' value='442617' \/><input type='hidden' id='answerType442617' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442617[]' id='answer-id-1712550' class='answer   answerof-442617 ' value='1712550'   \/><label for='answer-id-1712550' id='answer-label-1712550' class=' answer'><span>\/var\/spool\/cups<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442617[]' id='answer-id-1712551' class='answer   answerof-442617 ' value='1712551'   \/><label for='answer-id-1712551' id='answer-label-1712551' class=' answer'><span>\/var\/log\/daily.out<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442617[]' id='answer-id-1712552' class='answer   answerof-442617 ' value='1712552'   \/><label for='answer-id-1712552' id='answer-label-1712552' class=' answer'><span>\/var\/vm<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442617[]' id='answer-id-1712553' class='answer   answerof-442617 ' value='1712553'   \/><label for='answer-id-1712553' id='answer-label-1712553' class=' answer'><span>\/Library\/Receipts<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-11' style=';'><div id='questionWrap-11'  class='   watupro-question-id-442618'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>11. <\/span>Which description applies to the Advanced Forensic Format (AFF)?<\/div><input type='hidden' name='question_id[]' id='qID_11' value='442618' \/><input type='hidden' id='answerType442618' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442618[]' id='answer-id-1712554' class='answer   answerof-442618 ' value='1712554'   \/><label for='answer-id-1712554' id='answer-label-1712554' class=' answer'><span>An open file standard developed by AccessData<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442618[]' id='answer-id-1712555' class='answer   answerof-442618 ' value='1712555'   \/><label for='answer-id-1712555' id='answer-label-1712555' class=' answer'><span>A proprietary format used by the iLook tool<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442618[]' id='answer-id-1712556' class='answer   answerof-442618 ' value='1712556'   \/><label for='answer-id-1712556' id='answer-label-1712556' class=' answer'><span>An open file standard used by Sleuth Kit and Autopsy<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442618[]' id='answer-id-1712557' class='answer   answerof-442618 ' value='1712557'   \/><label for='answer-id-1712557' id='answer-label-1712557' class=' answer'><span>A proprietary format developed by Guidance Software<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-12' style=';'><div id='questionWrap-12'  class='   watupro-question-id-442619'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>12. <\/span>A victim of Internet fraud fell for an online offer after using a search engine to find a deal on an expensive software purchase. Once the victim learned about the fraud, he contacted a forensic investigator for help. <br \/>\r<br>Which digital evidence should the investigator collect?<\/div><input type='hidden' name='question_id[]' id='qID_12' value='442619' \/><input type='hidden' id='answerType442619' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442619[]' id='answer-id-1712558' class='answer   answerof-442619 ' value='1712558'   \/><label for='answer-id-1712558' id='answer-label-1712558' class=' answer'><span>Virus signatures<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442619[]' id='answer-id-1712559' class='answer   answerof-442619 ' value='1712559'   \/><label for='answer-id-1712559' id='answer-label-1712559' class=' answer'><span>Whois records<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442619[]' id='answer-id-1712560' class='answer   answerof-442619 ' value='1712560'   \/><label for='answer-id-1712560' id='answer-label-1712560' class=' answer'><span>Computer logs<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442619[]' id='answer-id-1712561' class='answer   answerof-442619 ' value='1712561'   \/><label for='answer-id-1712561' id='answer-label-1712561' class=' answer'><span>Email headers<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-13' style=';'><div id='questionWrap-13'  class='   watupro-question-id-442620'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>13. <\/span>A company has identified that a hacker has modified files on one of the company's computers. The IT department has collected the storage media from the hacked computer. <br \/>\r<br>Which evidence should be obtained from the storage media to identify which files were modified?<\/div><input type='hidden' name='question_id[]' id='qID_13' value='442620' \/><input type='hidden' id='answerType442620' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442620[]' id='answer-id-1712562' class='answer   answerof-442620 ' value='1712562'   \/><label for='answer-id-1712562' id='answer-label-1712562' class=' answer'><span>File timestamps<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442620[]' id='answer-id-1712563' class='answer   answerof-442620 ' value='1712563'   \/><label for='answer-id-1712563' id='answer-label-1712563' class=' answer'><span>Private IP addresses<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442620[]' id='answer-id-1712564' class='answer   answerof-442620 ' value='1712564'   \/><label for='answer-id-1712564' id='answer-label-1712564' class=' answer'><span>Public IP addresses<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442620[]' id='answer-id-1712565' class='answer   answerof-442620 ' value='1712565'   \/><label for='answer-id-1712565' id='answer-label-1712565' class=' answer'><span>Operating system version<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-14' style=';'><div id='questionWrap-14'  class='   watupro-question-id-442621'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>14. <\/span>A digital forensic examiner receives a computer used in a hacking case. The examiner is asked to extract information from the computer's Registry. <br \/>\r<br>How should the examiner proceed when obtaining the requested digital evidence?<\/div><input type='hidden' name='question_id[]' id='qID_14' value='442621' \/><input type='hidden' id='answerType442621' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442621[]' id='answer-id-1712566' class='answer   answerof-442621 ' value='1712566'   \/><label for='answer-id-1712566' id='answer-label-1712566' class=' answer'><span>Ensure that any tools and techniques used are widely accepted<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442621[]' id='answer-id-1712567' class='answer   answerof-442621 ' value='1712567'   \/><label for='answer-id-1712567' id='answer-label-1712567' class=' answer'><span>Investigate whether the computer was properly seized<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442621[]' id='answer-id-1712568' class='answer   answerof-442621 ' value='1712568'   \/><label for='answer-id-1712568' id='answer-label-1712568' class=' answer'><span>Enlist a colleague to witness the investigative process<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442621[]' id='answer-id-1712569' class='answer   answerof-442621 ' value='1712569'   \/><label for='answer-id-1712569' id='answer-label-1712569' class=' answer'><span>Download a tool from a hacking website to extract the data<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-15' style=';'><div id='questionWrap-15'  class='   watupro-question-id-442622'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>15. <\/span>Which type of information does a Windows SAM file contain?<\/div><input type='hidden' name='question_id[]' id='qID_15' value='442622' \/><input type='hidden' id='answerType442622' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442622[]' id='answer-id-1712570' class='answer   answerof-442622 ' value='1712570'   \/><label for='answer-id-1712570' id='answer-label-1712570' class=' answer'><span>Hash of network passwords<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442622[]' id='answer-id-1712571' class='answer   answerof-442622 ' value='1712571'   \/><label for='answer-id-1712571' id='answer-label-1712571' class=' answer'><span>Encrypted network passwords<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442622[]' id='answer-id-1712572' class='answer   answerof-442622 ' value='1712572'   \/><label for='answer-id-1712572' id='answer-label-1712572' class=' answer'><span>Hash of local Windows passwords<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442622[]' id='answer-id-1712573' class='answer   answerof-442622 ' value='1712573'   \/><label for='answer-id-1712573' id='answer-label-1712573' class=' answer'><span>Encrypted local Windows passwords<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-16' style=';'><div id='questionWrap-16'  class='   watupro-question-id-442623'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>16. <\/span>Which directory contains the system's configuration files on a computer running Mac OS X?<\/div><input type='hidden' name='question_id[]' id='qID_16' value='442623' \/><input type='hidden' id='answerType442623' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442623[]' id='answer-id-1712574' class='answer   answerof-442623 ' value='1712574'   \/><label for='answer-id-1712574' id='answer-label-1712574' class=' answer'><span>\/var<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442623[]' id='answer-id-1712575' class='answer   answerof-442623 ' value='1712575'   \/><label for='answer-id-1712575' id='answer-label-1712575' class=' answer'><span>\/bin<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442623[]' id='answer-id-1712576' class='answer   answerof-442623 ' value='1712576'   \/><label for='answer-id-1712576' id='answer-label-1712576' class=' answer'><span>\/etc<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442623[]' id='answer-id-1712577' class='answer   answerof-442623 ' value='1712577'   \/><label for='answer-id-1712577' id='answer-label-1712577' class=' answer'><span>\/cfg<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-17' style=';'><div id='questionWrap-17'  class='   watupro-question-id-442624'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>17. <\/span>A forensic specialist is about to collect digital evidence from a suspect's computer hard drive. The computer is off. <br \/>\r<br>What should be the specialist's first step?<\/div><input type='hidden' name='question_id[]' id='qID_17' value='442624' \/><input type='hidden' id='answerType442624' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442624[]' id='answer-id-1712578' class='answer   answerof-442624 ' value='1712578'   \/><label for='answer-id-1712578' id='answer-label-1712578' class=' answer'><span>Carefully review the chain of custody form.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442624[]' id='answer-id-1712579' class='answer   answerof-442624 ' value='1712579'   \/><label for='answer-id-1712579' id='answer-label-1712579' class=' answer'><span>Turn the computer on and remove any malware.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442624[]' id='answer-id-1712580' class='answer   answerof-442624 ' value='1712580'   \/><label for='answer-id-1712580' id='answer-label-1712580' class=' answer'><span>Make a forensic copy of the computer's hard drive.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442624[]' id='answer-id-1712581' class='answer   answerof-442624 ' value='1712581'   \/><label for='answer-id-1712581' id='answer-label-1712581' class=' answer'><span>Turn the computer on and photograph the desktop.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-18' style=';'><div id='questionWrap-18'  class='   watupro-question-id-442625'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>18. <\/span>Where is the default location for 32-bit programs installed by a user on a 64-bit version of Windows 7?<\/div><input type='hidden' name='question_id[]' id='qID_18' value='442625' \/><input type='hidden' id='answerType442625' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442625[]' id='answer-id-1712582' class='answer   answerof-442625 ' value='1712582'   \/><label for='answer-id-1712582' id='answer-label-1712582' class=' answer'><span>C:ProgramData<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442625[]' id='answer-id-1712583' class='answer   answerof-442625 ' value='1712583'   \/><label for='answer-id-1712583' id='answer-label-1712583' class=' answer'><span>C:Program files<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442625[]' id='answer-id-1712584' class='answer   answerof-442625 ' value='1712584'   \/><label for='answer-id-1712584' id='answer-label-1712584' class=' answer'><span>C:Windows<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442625[]' id='answer-id-1712585' class='answer   answerof-442625 ' value='1712585'   \/><label for='answer-id-1712585' id='answer-label-1712585' class=' answer'><span>C:Program files (x86)<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-19' style=';'><div id='questionWrap-19'  class='   watupro-question-id-442626'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>19. <\/span>Which Windows 7 operating system log stores events collected from remote computers?<\/div><input type='hidden' name='question_id[]' id='qID_19' value='442626' \/><input type='hidden' id='answerType442626' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442626[]' id='answer-id-1712586' class='answer   answerof-442626 ' value='1712586'   \/><label for='answer-id-1712586' id='answer-label-1712586' class=' answer'><span>System<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442626[]' id='answer-id-1712587' class='answer   answerof-442626 ' value='1712587'   \/><label for='answer-id-1712587' id='answer-label-1712587' class=' answer'><span>Application<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442626[]' id='answer-id-1712588' class='answer   answerof-442626 ' value='1712588'   \/><label for='answer-id-1712588' id='answer-label-1712588' class=' answer'><span>ForwardedEvents<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442626[]' id='answer-id-1712589' class='answer   answerof-442626 ' value='1712589'   \/><label for='answer-id-1712589' id='answer-label-1712589' class=' answer'><span>Security<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-20' style=';'><div id='questionWrap-20'  class='   watupro-question-id-442627'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>20. <\/span>Which information is included in an email header?<\/div><input type='hidden' name='question_id[]' id='qID_20' value='442627' \/><input type='hidden' id='answerType442627' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442627[]' id='answer-id-1712590' class='answer   answerof-442627 ' value='1712590'   \/><label for='answer-id-1712590' id='answer-label-1712590' class=' answer'><span>Sender's MAC address<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442627[]' id='answer-id-1712591' class='answer   answerof-442627 ' value='1712591'   \/><label for='answer-id-1712591' id='answer-label-1712591' class=' answer'><span>Number of pages<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442627[]' id='answer-id-1712592' class='answer   answerof-442627 ' value='1712592'   \/><label for='answer-id-1712592' id='answer-label-1712592' class=' answer'><span>Content-Type<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442627[]' id='answer-id-1712593' class='answer   answerof-442627 ' value='1712593'   \/><label for='answer-id-1712593' id='answer-label-1712593' class=' answer'><span>Message-Digest<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-21' style=';'><div id='questionWrap-21'  class='   watupro-question-id-442628'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>21. <\/span>Susan was looking at her credit report and noticed that several new credit cards had been opened lately in her name. Susan has not opened any of the credit card accounts herself. <br \/>\r<br>Which type of cybercrime has been perpetrated against Susan?<\/div><input type='hidden' name='question_id[]' id='qID_21' value='442628' \/><input type='hidden' id='answerType442628' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442628[]' id='answer-id-1712594' class='answer   answerof-442628 ' value='1712594'   \/><label for='answer-id-1712594' id='answer-label-1712594' class=' answer'><span>Identity theft<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442628[]' id='answer-id-1712595' class='answer   answerof-442628 ' value='1712595'   \/><label for='answer-id-1712595' id='answer-label-1712595' class=' answer'><span>SQL injection<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442628[]' id='answer-id-1712596' class='answer   answerof-442628 ' value='1712596'   \/><label for='answer-id-1712596' id='answer-label-1712596' class=' answer'><span>Cyberstalking<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442628[]' id='answer-id-1712597' class='answer   answerof-442628 ' value='1712597'   \/><label for='answer-id-1712597' id='answer-label-1712597' class=' answer'><span>Malware<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-22' style=';'><div id='questionWrap-22'  class='   watupro-question-id-442629'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>22. <\/span>A forensic examiner is reviewing a laptop running OS X which has been compromised. The examiner wants to know if any shell commands were executed by any of the accounts. <br \/>\r<br>Which log file or folder should be reviewed?<\/div><input type='hidden' name='question_id[]' id='qID_22' value='442629' \/><input type='hidden' id='answerType442629' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442629[]' id='answer-id-1712598' class='answer   answerof-442629 ' value='1712598'   \/><label for='answer-id-1712598' id='answer-label-1712598' class=' answer'><span>\/var\/vm<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442629[]' id='answer-id-1712599' class='answer   answerof-442629 ' value='1712599'   \/><label for='answer-id-1712599' id='answer-label-1712599' class=' answer'><span>\/Users\/&lt;user&gt;\/.bash_history<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442629[]' id='answer-id-1712600' class='answer   answerof-442629 ' value='1712600'   \/><label for='answer-id-1712600' id='answer-label-1712600' class=' answer'><span>\/var\/log<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442629[]' id='answer-id-1712601' class='answer   answerof-442629 ' value='1712601'   \/><label for='answer-id-1712601' id='answer-label-1712601' class=' answer'><span>\/Users\/&lt;user&gt;\/Library\/Preferences<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-23' style=';'><div id='questionWrap-23'  class='   watupro-question-id-442630'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>23. <\/span>A USB flash drive was seized as evidence to be entered into a trial. <br \/>\r<br>Which type of evidence is this USB flash drive?<\/div><input type='hidden' name='question_id[]' id='qID_23' value='442630' \/><input type='hidden' id='answerType442630' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442630[]' id='answer-id-1712602' class='answer   answerof-442630 ' value='1712602'   \/><label for='answer-id-1712602' id='answer-label-1712602' class=' answer'><span>Documentary<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442630[]' id='answer-id-1712603' class='answer   answerof-442630 ' value='1712603'   \/><label for='answer-id-1712603' id='answer-label-1712603' class=' answer'><span>Demonstrative<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442630[]' id='answer-id-1712604' class='answer   answerof-442630 ' value='1712604'   \/><label for='answer-id-1712604' id='answer-label-1712604' class=' answer'><span>Testimonial<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442630[]' id='answer-id-1712605' class='answer   answerof-442630 ' value='1712605'   \/><label for='answer-id-1712605' id='answer-label-1712605' class=' answer'><span>Real<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-24' style=';'><div id='questionWrap-24'  class='   watupro-question-id-442631'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>24. <\/span>Which term describes the used space between the end of a file and the end of the last cluster assigned to the file?<\/div><input type='hidden' name='question_id[]' id='qID_24' value='442631' \/><input type='hidden' id='answerType442631' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442631[]' id='answer-id-1712606' class='answer   answerof-442631 ' value='1712606'   \/><label for='answer-id-1712606' id='answer-label-1712606' class=' answer'><span>Unallocated space<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442631[]' id='answer-id-1712607' class='answer   answerof-442631 ' value='1712607'   \/><label for='answer-id-1712607' id='answer-label-1712607' class=' answer'><span>Volume slack<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442631[]' id='answer-id-1712608' class='answer   answerof-442631 ' value='1712608'   \/><label for='answer-id-1712608' id='answer-label-1712608' class=' answer'><span>Host protected area<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442631[]' id='answer-id-1712609' class='answer   answerof-442631 ' value='1712609'   \/><label for='answer-id-1712609' id='answer-label-1712609' class=' answer'><span>File slack<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-25' style=';'><div id='questionWrap-25'  class='   watupro-question-id-442632'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>25. <\/span>An employee sends an email message to a fellow employee. The message is sent through the company's messaging server. <br \/>\r<br>Which protocol is used to send the email message?<\/div><input type='hidden' name='question_id[]' id='qID_25' value='442632' \/><input type='hidden' id='answerType442632' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442632[]' id='answer-id-1712610' class='answer   answerof-442632 ' value='1712610'   \/><label for='answer-id-1712610' id='answer-label-1712610' class=' answer'><span>SNMP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442632[]' id='answer-id-1712611' class='answer   answerof-442632 ' value='1712611'   \/><label for='answer-id-1712611' id='answer-label-1712611' class=' answer'><span>IMAP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442632[]' id='answer-id-1712612' class='answer   answerof-442632 ' value='1712612'   \/><label for='answer-id-1712612' id='answer-label-1712612' class=' answer'><span>POP3<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442632[]' id='answer-id-1712613' class='answer   answerof-442632 ' value='1712613'   \/><label for='answer-id-1712613' id='answer-label-1712613' class=' answer'><span>SMTP<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-26' style=';'><div id='questionWrap-26'  class='   watupro-question-id-442633'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>26. <\/span>Which principle of evidence collection states that access to evidence must be tracked from the time it is seized through its use in court?<\/div><input type='hidden' name='question_id[]' id='qID_26' value='442633' \/><input type='hidden' id='answerType442633' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442633[]' id='answer-id-1712614' class='answer   answerof-442633 ' value='1712614'   \/><label for='answer-id-1712614' id='answer-label-1712614' class=' answer'><span>Evidence record<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442633[]' id='answer-id-1712615' class='answer   answerof-442633 ' value='1712615'   \/><label for='answer-id-1712615' id='answer-label-1712615' class=' answer'><span>Chain of custody<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442633[]' id='answer-id-1712616' class='answer   answerof-442633 ' value='1712616'   \/><label for='answer-id-1712616' id='answer-label-1712616' class=' answer'><span>Event log<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442633[]' id='answer-id-1712617' class='answer   answerof-442633 ' value='1712617'   \/><label for='answer-id-1712617' id='answer-label-1712617' class=' answer'><span>Audit log<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-27' style=';'><div id='questionWrap-27'  class='   watupro-question-id-442634'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>27. <\/span>How is the Windows swap file, also known as page file, used?<\/div><input type='hidden' name='question_id[]' id='qID_27' value='442634' \/><input type='hidden' id='answerType442634' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442634[]' id='answer-id-1712618' class='answer   answerof-442634 ' value='1712618'   \/><label for='answer-id-1712618' id='answer-label-1712618' class=' answer'><span>Replaces bad sectors<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442634[]' id='answer-id-1712619' class='answer   answerof-442634 ' value='1712619'   \/><label for='answer-id-1712619' id='answer-label-1712619' class=' answer'><span>Primarily for security<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442634[]' id='answer-id-1712620' class='answer   answerof-442634 ' value='1712620'   \/><label for='answer-id-1712620' id='answer-label-1712620' class=' answer'><span>Augments the RAM<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442634[]' id='answer-id-1712621' class='answer   answerof-442634 ' value='1712621'   \/><label for='answer-id-1712621' id='answer-label-1712621' class=' answer'><span>Reserved for system files<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-28' style=';'><div id='questionWrap-28'  class='   watupro-question-id-442635'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>28. <\/span>A forensics investigator is investigating a Windows computer which may be collecting data from other computers on the network. <br \/>\r<br>Which Windows command line tool can be used to determine connections between machines?<\/div><input type='hidden' name='question_id[]' id='qID_28' value='442635' \/><input type='hidden' id='answerType442635' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442635[]' id='answer-id-1712622' class='answer   answerof-442635 ' value='1712622'   \/><label for='answer-id-1712622' id='answer-label-1712622' class=' answer'><span>Telnet<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442635[]' id='answer-id-1712623' class='answer   answerof-442635 ' value='1712623'   \/><label for='answer-id-1712623' id='answer-label-1712623' class=' answer'><span>Xdetect<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442635[]' id='answer-id-1712624' class='answer   answerof-442635 ' value='1712624'   \/><label for='answer-id-1712624' id='answer-label-1712624' class=' answer'><span>Openfiles<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442635[]' id='answer-id-1712625' class='answer   answerof-442635 ' value='1712625'   \/><label for='answer-id-1712625' id='answer-label-1712625' class=' answer'><span>Netstat<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-29' style=';'><div id='questionWrap-29'  class='   watupro-question-id-442636'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>29. <\/span>Which storage format is a magnetic drive?<\/div><input type='hidden' name='question_id[]' id='qID_29' value='442636' \/><input type='hidden' id='answerType442636' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442636[]' id='answer-id-1712626' class='answer   answerof-442636 ' value='1712626'   \/><label for='answer-id-1712626' id='answer-label-1712626' class=' answer'><span>CD-ROM<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442636[]' id='answer-id-1712627' class='answer   answerof-442636 ' value='1712627'   \/><label for='answer-id-1712627' id='answer-label-1712627' class=' answer'><span>SATA<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442636[]' id='answer-id-1712628' class='answer   answerof-442636 ' value='1712628'   \/><label for='answer-id-1712628' id='answer-label-1712628' class=' answer'><span>Blu-ray<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442636[]' id='answer-id-1712629' class='answer   answerof-442636 ' value='1712629'   \/><label for='answer-id-1712629' id='answer-label-1712629' class=' answer'><span>SSD<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-30' style=';'><div id='questionWrap-30'  class='   watupro-question-id-442637'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>30. <\/span>Which file stores local Windows passwords in the WindowsSystem32 directory and is subject to being cracked by using a live CD?<\/div><input type='hidden' name='question_id[]' id='qID_30' value='442637' \/><input type='hidden' id='answerType442637' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442637[]' id='answer-id-1712630' class='answer   answerof-442637 ' value='1712630'   \/><label for='answer-id-1712630' id='answer-label-1712630' class=' answer'><span>SAM<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442637[]' id='answer-id-1712631' class='answer   answerof-442637 ' value='1712631'   \/><label for='answer-id-1712631' id='answer-label-1712631' class=' answer'><span>IPSec<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442637[]' id='answer-id-1712632' class='answer   answerof-442637 ' value='1712632'   \/><label for='answer-id-1712632' id='answer-label-1712632' class=' answer'><span>HAL<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-442637[]' id='answer-id-1712633' class='answer   answerof-442637 ' value='1712633'   \/><label for='answer-id-1712633' id='answer-label-1712633' class=' answer'><span>Ntidr<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div style='display:none' id='question-31'>\n\t<div class='question-content'>\n\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/img\/loading.gif\" width=\"16\" height=\"16\" alt=\"Loading...\" title=\"Loading...\" \/>&nbsp;Loading...\t<\/div>\n<\/div>\n\n<br \/>\n\t\n\t\t\t<div class=\"watupro_buttons flex \" id=\"watuPROButtons11257\" >\n\t\t  <div id=\"prev-question\" style=\"display:none;\"><input type=\"button\" value=\"&lt; Previous\" onclick=\"WatuPRO.nextQuestion(event, 'previous');\"\/><\/div>\t\t  \t\t  \t\t   \n\t\t   \t  \t\t<div><input type=\"button\" name=\"action\" class=\"watupro-submit-button\" onclick=\"WatuPRO.submitResult(event)\" id=\"action-button\" value=\"View Results\"  \/>\n\t\t<\/div>\n\t\t<\/div>\n\t\t\n\t<input type=\"hidden\" name=\"quiz_id\" value=\"11257\" id=\"watuPROExamID\"\/>\n\t<input type=\"hidden\" name=\"start_time\" id=\"startTime\" value=\"2026-04-19 14:45:48\" \/>\n\t<input type=\"hidden\" name=\"start_timestamp\" id=\"startTimeStamp\" value=\"1776609948\" \/>\n\t<input type=\"hidden\" name=\"question_ids\" value=\"\" \/>\n\t<input type=\"hidden\" name=\"watupro_questions\" value=\"442608:1712514,1712515,1712516,1712517 | 442609:1712518,1712519,1712520,1712521 | 442610:1712522,1712523,1712524,1712525 | 442611:1712526,1712527,1712528,1712529 | 442612:1712530,1712531,1712532,1712533 | 442613:1712534,1712535,1712536,1712537 | 442614:1712538,1712539,1712540,1712541 | 442615:1712542,1712543,1712544,1712545 | 442616:1712546,1712547,1712548,1712549 | 442617:1712550,1712551,1712552,1712553 | 442618:1712554,1712555,1712556,1712557 | 442619:1712558,1712559,1712560,1712561 | 442620:1712562,1712563,1712564,1712565 | 442621:1712566,1712567,1712568,1712569 | 442622:1712570,1712571,1712572,1712573 | 442623:1712574,1712575,1712576,1712577 | 442624:1712578,1712579,1712580,1712581 | 442625:1712582,1712583,1712584,1712585 | 442626:1712586,1712587,1712588,1712589 | 442627:1712590,1712591,1712592,1712593 | 442628:1712594,1712595,1712596,1712597 | 442629:1712598,1712599,1712600,1712601 | 442630:1712602,1712603,1712604,1712605 | 442631:1712606,1712607,1712608,1712609 | 442632:1712610,1712611,1712612,1712613 | 442633:1712614,1712615,1712616,1712617 | 442634:1712618,1712619,1712620,1712621 | 442635:1712622,1712623,1712624,1712625 | 442636:1712626,1712627,1712628,1712629 | 442637:1712630,1712631,1712632,1712633\" \/>\n\t<input type=\"hidden\" name=\"no_ajax\" value=\"0\">\t\t\t<\/form>\n\t<p>&nbsp;<\/p>\n<\/div>\n\n<script type=\"text\/javascript\">\n\/\/jQuery(document).ready(function(){\ndocument.addEventListener(\"DOMContentLoaded\", function(event) { \t\nvar question_ids = \"442608,442609,442610,442611,442612,442613,442614,442615,442616,442617,442618,442619,442620,442621,442622,442623,442624,442625,442626,442627,442628,442629,442630,442631,442632,442633,442634,442635,442636,442637\";\nWatuPROSettings[11257] = {};\nWatuPRO.qArr = question_ids.split(',');\nWatuPRO.exam_id = 11257;\t    \nWatuPRO.post_id = 115477;\nWatuPRO.store_progress = 0;\nWatuPRO.curCatPage = 1;\nWatuPRO.requiredIDs=\"0\".split(\",\");\nWatuPRO.hAppID = \"0.35849300 1776609948\";\nvar url = \"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/show_exam.php\";\nWatuPRO.examMode = 1;\nWatuPRO.siteURL=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-admin\/admin-ajax.php\";\nWatuPRO.emailIsNotRequired = 0;\nWatuPROIntel.init(11257);\nWatuPRO.inCategoryPages=1;});    \t \n<\/script>\n","protected":false},"excerpt":{"rendered":"<p>It must be clear that the Digital Forensics in Cybersecurity is a WGU exam course that explores the specialised field of digital forensics as it applies to cybersecurity. It teaches you how to investigate cybercrimes, preserve evidence, analyse breaches, and prepare findings for legal or organisational actions. However, preparing for the Digital Forensics in Cybersecurity [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[18084,18083],"tags":[20459,20458],"class_list":["post-115477","post","type-post","status-publish","format-standard","hentry","category-courses-and-certificates","category-wgu","tag-digital-forensics-in-cybersecurity-question","tag-wgu-digital-forensics-in-cybersecurity-dumps"],"_links":{"self":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/115477","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/comments?post=115477"}],"version-history":[{"count":1,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/115477\/revisions"}],"predecessor-version":[{"id":115478,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/115477\/revisions\/115478"}],"wp:attachment":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/media?parent=115477"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/categories?post=115477"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/tags?post=115477"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}