100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
WGU C840 Digital Forensics in Cybersecurity Certified Information Technology Final Exam Review Questions and Certified Answers 2024/2025 $12.49   Add to cart

Exam (elaborations)

WGU C840 Digital Forensics in Cybersecurity Certified Information Technology Final Exam Review Questions and Certified Answers 2024/2025

 10 views  0 purchase
  • Course
  • WGU C840
  • Institution
  • WGU C840

WGU C840 Digital Forensics in Cybersecurity Certified Information Technology Final Exam Review Questions and Certified Answers 2024/2025 Logical analysis - correct answer Analysis involving using the native operating system, on the evidence disk or a forensic duplicate, to peruse the data. Ph...

[Show more]

Preview 4 out of 66  pages

  • September 1, 2024
  • 66
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • WGU C840
  • WGU C840
avatar-seller
KieranKent55
WGU C840 Digital Forensics in Cybersecurity Certified
Information Technology Final Exam Review Questions and
Certified Answers 2024/2025

Logical analysis - correct answer Analysis involving using the native operating
system, on the evidence disk or a forensic duplicate, to peruse the data.


Physical analysis - correct answer Offline analysis conducted on an evidence disk
or forensic duplicate after booting from a CD or another system. Physical analysis
is looking for things that may have been overlooked, or are invisible, to the user.


Scrubber - correct answer Software that cleans unallocated space. Also called a
sweeper.


Sweeper - correct answer A kind of software that cleans unallocated space. Also
called a scrubber.


Temporary data - correct answer Data that an operating system creates and
overwrites without the computer user taking a direct action to save this data.


Unallocated space - correct answer Free space, or the area of a hard drive that
has never been allocated for file storage.


What Linux command can be used to wipe a target drive? - correct answer dd


sweepers or scrubbers. - correct answer The only way to clean unallocated space

,What Linux command can be used to create a hash? - correct answer MD5sum. In
Linux, the following command hashes a partition:
md5sum /dev/hda1


(Steganography) Payload - correct answer the information to be covertly
communicated. In other words, it is the message you want to hide.


(Steganography) Carrier - correct answer or carrier file is the signal, stream, or file
in which the payload is hidden.


(Steganography) Channel - correct answer is the type of medium used. This may
be a passive channel, such as photos, video, or sound files, or even an active
channel, such as a Voice over IP (VoIP) voice call or streaming video connection.


Steganophony - correct answer hiding messages in sound files. This can be done
with the LSB method. However, another method to use with steganophony is the
echo method. This method adds extra sound to an echo inside an audio file. It is
that extra sound that contains information. Steganophony can be used with static
files, such as MP3 files, but can also be used dynamically with VoIP and similar
multimedia technologies, also utilizing the LSB method and imperceptibly
changing the sound being transmitted.


Steganalysis - correct answer The determination of whether a file or
communication hides other information.


dead drop - correct answer is a location where one person drops off an item and a
second person picks it up.

,Known plaintext attack - correct answer This method is based on having a sample
of known plaintexts and their resulting ciphertexts, and then using this
information to try to ascertain something about the key used.


Chosen plaintext attack: - correct answer In this attack, the attacker obtains the
ciphertexts corresponding to a set of plaintexts of his or her own choosing.


Ciphertext-only attack - correct answer The attacker only has access to a
collection of ciphertexts.


Related-key attack - correct answer This attack is like a chosen plaintext attack,
except the attacker can obtain ciphertexts encrypted under two different keys.


Euler's Totient - correct answer The total number of coprime numbers. Two
numbers are considered coprime if they have no common factors.


Kasiski examination - correct answer A method of attacking polyalphabetic
substitution ciphers, this method can be used to deduce the length of the
keyword used in a polyalphabetic substitution cipher. This is sometimes also called
Kasiski's test or Kasiski's method.


The most common way steganography is accomplished is via ________. - correct
answer LSB. The least significant bit (LSB) method is when the last bit or least
significant bit is used to store data.


Feistel Function - correct answer Refers to a cryptographic function that splits
blocks of data into two parts, and is one of the most influential developments in
symmetric block ciphers.

, Which of the following is an asymmetric cryptography algorithm invented by three
mathematicians in the 1970s? - correct answer RSA. It is based on some
interesting relationships of prime numbers. The security of RSA derives from the
fact that it is difficult to factor a large integer composed of two or more large
prime factors.


file allocation table - correct answer a list of entries that map to each cluster on
the disk partition.


inode - correct answer is a data structure in the file system that stores all the
information about a file except its name and its actual data. 128 bytes that are
stored in a table.


Macintosh has ________ file system. - correct answer it's own


clean room - correct answer is an environment that has a controlled level of
contamination, such as from dust, microbes, and other particles.


Test system - correct answer A compatible system that is functional.


Logical damage - correct answer Damage that may prevent the host operating
system from mounting or using the file system. Or damage to how the data is
stored, for example file system corruption.


Consistency checking - correct answer Protects against file system software bugs
and storage hardware design incompatibilities. Involves scanning a disk's logical
structure and ensuring that it is consistent with its specification.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller KieranKent55. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $12.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

82871 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$12.49
  • (0)
  Add to cart