How is the Windows swap file, also known as page file, used?
Where is the default location for 32-bit programs installed by a user on a 64-bit version of Windows 7?
An organization has identified a system breach and has collected volatile data from the system.
Which evidence type should be collected next?
Which type of storage format should be transported in a special bag to reduce electrostatic interference?
Which U.S. law protects journalists from turning over their work or sources to law enforcement before the information is shared with the public?
How should a forensic scientist obtain the network configuration from a Windows PC before seizing it from a crime scene?
The chief information officer of an accounting firm believes sensitive data is being exposed on the local network.
Which tool should the IT staff use to gather digital evidence about this security vulnerability?
Which tool should a forensic investigator use to determine whether data are leaving an organization through steganographic methods?
Which policy is included in the CAN-SPAM Act?
Which U.S. law criminalizes the act of knowingly using a misleading domain name with the intent to deceive a minor into viewing harmful material?
|
PDF + Testing Engine
|
|---|
|
$57.75 |
|
Testing Engine
|
|---|
|
$43.75 |
|
PDF (Q&A)
|
|---|
|
$36.75 |
WGU Free Exams |
|---|
|