WGU C840 OBJECTIVE ASSESSMENT 2 NEWEST VERSIONS 2024 DIGITAL FORENSICS IN CYBERSECURITY VERSION A AND VERSION B COMPLETE 420 QUESTIONS AND CORRECT DETAILED ANSWERS (VERIFIED ANSWERS) |ALREADY GRADED A+
1 | P a g e
WGU C840 OBJECTIVE ASSESSMENT 2 NEWEST VERSIONS
2024 DIGITAL FORENSICS IN CYBERSECURITY VERSION A
AND VERSION B COMPLETE 420 QUESTIONS AND
CORRECT DETAILED ANSWERS (VERIFIED ANSWERS)
|ALREADY GRADED A+
WGU C840 DIGITAL FORENSICS IN CYBERSECURITY VERSION A
A system administrator believes data are being leaked from the
organization. The administrator decides to use steganography to hide
tracking information in the types of files he thinks are being leaked.
Which steganographic term describes this tracking information?
A Carrier
B Payload
C Channel
D Audit - ANSWER- B
A criminal organization has compromised a third-party web server and
is using it to control a botnet. The botnet server hides command and
control messages through the DNS protocol.
2 | P a g e
Which steganographic component are the command and control
messages?
A Carrier
B Dead drop
C Payload
D Channel - ANSWER- C
Which method is commonly used to hide data via steganography?
A RSA
B DES
C LSB
D AES - ANSWER- C
A system administrator believes an employee is leaking information to a
competitor by hiding confidential data in images being attached to
outgoing emails. The administrator has captured the outgoing emails.
Which tool should the forensic investigator use to search for the hidden
data in the images?
A Data Doctor
B Forensic Toolkit (FTK)
3 | P a g e
C Snow
D Wolf - ANSWER- B
A foreign government is communicating with its agents in the U.S. by
hiding text messages in popular American songs, which are uploaded to
the web.
Which steganographic tool can be used to do this?
A Snow
B MP3Stego
C Steganophony
D QuickStego - ANSWER- B
During a cyber-forensics investigation, a USB drive was found that
contained multiple pictures of the same flower.
How should an investigator use properties of a file to detect
steganography?
A Review the properties log looking for changes compared to the
original file using a tool such as EnCase
B Review the hexadecimal code looking for anomalies in the file
headers and endings using a tool such as EnCase
4 | P a g e
C Compare the file extensions using a tool such as Windows Explorer
D Process the file using SHA-1 to generate a new hash value to compare
using a tool such as FTK - ANSWER- B
Where are local passwords stored for the Windows operating system?
A SAM file in \Windows\Security\
B In the registry key HKEY_LOCAL_MAHCINE\SECURITY
C SAM file in \Windows\System32\
D In the registry key HKEY_LOCAL_MACHINE\SYSTEM -
ANSWER- C
Where on a Windows system is the config folder located that contains
the SAM file?
A C:\Windows\System32
B C:\Windows\SystemResources
C C:\Users
D C:\Program Files - ANSWER- A
A forensic examiner wants to try to extract passwords for wireless
networks to which a system was connected.
Category | WGU EXAM |
Comments | 0 |
Rating | |
Sales | 0 |