WGU C702 OBJECTIVE ASSESSMENT EXAM AND PRACTICE EXAM NEWEST 2024 ACTUAL EXAM 450 QUESTIONS AND CORRECT DETAILED ANSWERS (VERIFIED ANSWERS) |ALREADY GRADED A+||COMPLETE COURSE
1 | P a g e
WGU C702 OBJECTIVE ASSESSMENT EXAM AND PRACTICE
EXAM NEWEST 2024 ACTUAL EXAM 450 QUESTIONS AND
CORRECT DETAILED ANSWERS (VERIFIED ANSWERS)
|ALREADY GRADED A+||COMPLETE COURSE
WGU C702 OBJECTIVE ASSESSMENT EXAM
Which of the following Federal Rules of Evidence states that the court
shall restrict the evidence to its proper scope and instruct the jury
accordingly?
A. Rule 105
B. Rule 102
C. Rule 103
D. Rule 101 - ANSWER- A. Rule 105
Which of the following answers refers to a set of methodological
procedures and techniques to identify, gather, preserve, extract, interpret,
document, and present evidence from computing equipment in such a
manner that the discovered evidence is acceptable during a legal and/or
administrative proceeding in a court of law?
A. Disaster recovery
B. Computer forensics
C. Incident handling
D. Network analysis - ANSWER- B. Computer forensics
Minimizing the tangible and intangible losses to the organization or an
individual is considered an essential computer forensics use.
2 | P a g e
A. True
B. False - ANSWER- A. True
Cybercrimes can be classified into the following two types of attacks,
based on the line of attack.
A. Fraud and spam
B. Internal and external
C. Phishing and malware - ANSWER- B. Internal and external
Espionage, theft of intellectual property, manipulation of records, and
Trojan horse attacks are examples of what?
A. Insider attacks or primary threats
B. Outsider attacks or secondary threats
C. Outsider attacks or primary threats
D. Insider attacks or secondary threats - ANSWER- A. Insider attacks or
primary threats
External attacks occur when there are inadequate information-security
policies and procedures.
A. False
B. True - ANSWER- B. True
Which type of cases involve disputes between two parties?
A. Civil
3 | P a g e
B. Administrative
C. Investigative
D. Criminal - ANSWER- A. Civil
A computer forensic examiner can investigate any crime as long as he or
she takes detailed notes and follows the appropriate processes.
A. True
B. False - ANSWER- B. False
________ is the standard investigative model used by the FBI when
conducting investigations against major criminal organizations.
A. Enterprise Theory of Investigation (ETI)
B. Entrepreneur Theory of Investigation
C. Both Enterprise Theory of Investigation (ETI) and Entrepreneur
Theory of Investigation - ANSWER- A. Enterprise Theory of
Investigation (ETI)
Forensic readiness includes technical and non-technical actions that
maximize an organization's competence to use digital evidence.
A. True
B. False - ANSWER- A. True
Which of the following is the process of developing a strategy to address
the occurrence of any security breach in the system or network?
A. Forensic readiness planning
4 | P a g e
B. Best evidence rule
C. Security policy
D. Incident response - ANSWER- D. Incident response
Codes of ethics are the principles stated to describe the expected
behavior of an investigator while handling a case. Which of the
following is not a principle that a computer forensic investigator must
follow?
A. Act with utmost ethical and moral principles.
B. Ensure integrity of the evidence throughout the investigation process.
C. Act in accordance with federal statutes, state statutes, and local laws
and policies.
D. Provide personal or prejudiced opinions. - ANSWER- D. Provide
personal or prejudiced opinions.
In forensics laws, "authenticating or identifying evidences" comes under
which rule?
A. Rule 801
B. Rule 708
C. Rule 608
D. Rule 901 - ANSWER- D. Rule 901
What requires companies that offer financial products or services to
protect customer information against security threats?
A. HIPAA
Category | Exams and Certifications |
Comments | 0 |
Rating | |
Sales | 0 |