The chief information officer of an accounting firm believes sensitive data is being exposed on the local
network. Which tool should the IT staff use to gather digital evidence about this security vulnerability?
A Sniffer
B Disk analyzer
C Tracer
D Virus scanner - correct answer A
A police detective investigating a threat traces the source to a house. The couple at the house shows the
detective the only computer the family owns, which is in their son's bedroom. The couple states that
their son is presently in class at a local middle school.
How should the detective legally gain access to the computer?
A Obtain a search warrant from the police
B Seize the computer under the USA Patriot Act
C Obtain consent to search from the parents
D Seize the computer under the Computer Security Act - correct answer C
How should a forensic scientist obtain the network configuration from a Windows PC before seizing it
from a crime scene?
A By using the ipconfig command from a command prompt on the computer
B By using the tracert command from a command prompt on the computer
Category | WGU EXAM |
Comments | 0 |
Rating | |
Sales | 0 |