100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
C840 Practice Assessment with complete solution $7.99   Add to cart

Exam (elaborations)

C840 Practice Assessment with complete solution

 1 view  0 purchase
  • Course
  • Gmt20024
  • Institution
  • Gmt20024

C840 Practice Assessment with complete solution

Preview 2 out of 10  pages

  • May 16, 2024
  • 10
  • 2023/2024
  • Exam (elaborations)
  • Questions & answers
  • Gmt20024
  • Gmt20024
avatar-seller
ACTUALSTUDY
C840
Practice
Assessment
Which
tool
should
the
IT
staff
use
to
gather
digital
evidence
about
this
security
vulnerability?
-
ANSWER-Sniffer
A
police
detective
investigating
a
threat
traces
the
source
to
a
house.
The
couple
at
the
house
shows
the
detective
the
only
computer
the
family
owns,
which
is
in
their
son's
bedroom.
The
couple
states
that
their
son
is
presently
in
class
at
a
local
middle
school.
How
should
the
detective
legally
gain
access
to
the
computer?
-
ANSWER-Obtain
consent
to
search
from
the
parents
How
should
a
forensic
scientist
obtain
the
network
configuration
from
a
Windows
PC
before
seizing
it
from
a
crime
scene?
-
ANSWER-By
using
the
ipconfig
command
from
a
command
prompt
on
the
computer
The
human
resources
manager
of
a
small
accounting
firm
believes
he
may
have
been
a
victim
of
a
phishing
scam.
The
manager
clicked
on
a
link
in
an
email
message
that
asked
him
to
verify
the
logon
credentials
for
the
firm's
online
bank
account.
-
ANSWER-Browser
cache
After
a
company's
single-purpose,
dedicated
messaging
server
is
hacked
by
a
cybercriminal,
a
forensics
expert
is
hired
to
investigate
the
crime
and
collect
evidence.
Which
digital
evidence
should
be
collected?
-
ANSWER-Firewall
logs
Thomas
received
an
email
stating
that
he
needed
to
follow
a
link
and
verify
his
bank
account
information
to
ensure
it
was
secure.
Shortly
after
following
the
instructions,
Thomas
noticed
money
was
missing
from
his
account.Which
digital
evidence
should
be
considered
to
determine
how
Thomas'
account
information
was
compromised?
-
ANSWER-Email
messages
The
chief
executive
officer
(CEO)
of
a
small
computer
company
has
identified
a
potential
hacking
attack
from
an
outside
competitor.
Which
type
of
evidence
should
a
forensics
investigator
use
to
identify
the
source
of
the
hack?
-
ANSWER-Network
transaction
logs A
forensic
scientist
arrives
at
a
crime
scene
to
begin
collecting
evidence.
What
is
the
first
thing
the
forensic
scientist
should
do?
-
ANSWER-Photograph
all
evidence
in
its
original
place
Which
method
of
copying
digital
evidence
ensures
proper
evidence
collection?
-
ANSWER-Make
the
copy
at
the
bit-level
A
computer
involved
in
a
crime
is
infected
with
malware.
The
computer
is
on
and
connected
to
the
company's
network.
The
forensic
investigator
arrives
at
the
scene.
Which
action
should
be
the
investigator's
first
step?
-
ANSWER-Unplug
the
computer's
Ethernet
cable.
What
are
the
three
basic
tasks
that
a
systems
forensic
specialist
must
keep
in
mind
when
handling
evidence
during
a
cybercrime
investigation?
Answer
options
may
be
used
more
than
once
or
not
at
all.
Select
your
answers
from
the
pull-down
list.
-
ANSWER-Find
evidence,
Preserve
evidence,
Prepare
evidence
How
do
forensic
specialists
show
that
digital
evidence
was
handled
in
a
protected,
secure
manner
during
the
process
of
collecting
and
analyzing
the
evidence?
-
ANSWER-Chain
of
custody
Which
characteristic
applies
to
magnetic
drives
compared
to
solid-state
drives
(SSDs)?
-
ANSWER-Lower
cost
Which
characteristic
applies
to
solid-state
drives
(SSDs)
compared
to
magnetic
drives?
-
ANSWER-They
are
less
susceptible
to
damage.
Which
type
of
storage
format
should
be
transported
in
a
special
bag
to
reduce
electrostatic
interference?
-
ANSWER-Magnetic
media
Which
Windows
component
is
responsible
for
reading
the
boot.ini
file
and
displaying
the
boot
loader
menu
on
Windows
XP
during
the
boot
process?
-
ANSWER-NTLDR
The
following
line
of
code
is
an
example
of
how
to
make
a
forensic
copy
of
a
suspect
drive:

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller ACTUALSTUDY. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $7.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

78998 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$7.99
  • (0)
  Add to cart