WGU Digital-Forensics-in-Cybersecurity Exam (page: 1)
WGU Digital Forensics in Cybersecurity (D431/C840) Course
Updated on: 24-Mar-2026

An organization believes that a company-owned mobile phone has been compromised.

Which software should be used to collect an image of the phone as digital evidence?

  1. PTFinder
  2. Forensic SIM Cloner
  3. Forensic Toolkit (FTK)
  4. Data Doctor

Answer(s): C

Explanation:

Comprehensive and Detailed Explanation From Exact Extract:

Forensic Toolkit (FTK) is a widely recognized and trusted software suite in digital forensics used to acquire and analyze forensic images of devices, including mobile phones. FTK supports the creation of bit-by-bit images of digital evidence, ensuring the integrity and admissibility of the evidence in legal contexts. This imaging process is crucial in preserving the original state of the device data without alteration.

FTK enables forensic investigators to perform logical and physical acquisitions of mobile devices.

It maintains the integrity of the evidence by generating cryptographic hash values (MD5, SHA-1) to prove that the image is an exact copy.

Other options such as PTFinder or Forensic SIM Cloner focus on specific tasks like SIM card cloning or targeted data extraction but do not provide full forensic imaging capabilities.

Data Doctor is more aligned with data recovery rather than forensic imaging.


Reference:

According to standard digital forensics methodologies outlined by NIST Special Publication 800-101 (Guidelines on Mobile Device Forensics) and the SANS Institute Digital Forensics and Incident Response guides, forensic tools used to acquire mobile device images must be capable of bit-stream copying with hash verification, which FTK provides.



A digital forensic examiner receives a computer used in a hacking case. The examiner is asked to extract information from the computer's Registry.

How should the examiner proceed when obtaining the requested digital evidence?

  1. Ensure that any tools and techniques used are widely accepted
  2. Investigate whether the computer was properly seized
  3. Enlist a colleague to witness the investigative process
  4. Download a tool from a hacking website to extract the data

Answer(s): A

Explanation:

Comprehensive and Detailed Explanation From Exact Extract:

In digital forensics, the use of reliable, validated, and widely accepted tools and techniques is critical to maintain the integrity and admissibility of digital evidence. According to the National Institute of Standards and Technology (NIST) guidelines and the Scientific Working Group on Digital Evidence (SWGDE) standards, any forensic process must utilize methods that are recognized by the forensic community and have undergone rigorous testing to ensure accuracy and reliability.

Using validated tools helps prevent evidence contamination or loss and ensures that results can withstand legal scrutiny.

While proper seizure and witnessing are important, the priority in the extraction phase is to use appropriate, trusted tools.

Downloading tools from unauthorized or suspicious sources can compromise the evidence and is not an ethical or legal practice.


Reference:

NIST SP 800-101 (Guidelines on Mobile Device Forensics) and SWGDE Best Practices emphasize tool validation and adherence to community-accepted methods as foundational principles in forensic examination.



A victim of Internet fraud fell for an online offer after using a search engine to find a deal on an expensive software purchase. Once the victim learned about the fraud, he contacted a forensic investigator for help.

Which digital evidence should the investigator collect?

  1. Virus signatures
  2. Whois records
  3. Computer logs
  4. Email headers

Answer(s): C

Explanation:

Comprehensive and Detailed Explanation From Exact Extract:

In Internet fraud investigations, computer logs are critical because they provide a record of user activity, including browsing history, downloads, and system events. These logs can help establish a timeline, identify malicious access, and confirm fraudulent transactions.

Computer logs may include browser history, system event logs, and application logs that document the victim's interaction with the fraudulent offer.

Whois records help identify domain registration details but are secondary evidence.

Email headers are relevant if communication via email was part of the fraud but less critical than logs that show direct interaction.

Virus signatures are used in malware investigations, not directly relevant to fraud evidence collection.


Reference:

According to guidelines by the International Journal of Digital Crime and Forensics and the SANS

Institute, capturing logs is essential in building a case for Internet fraud as it provides objective data about the victim's system and activities.



A cybercriminal hacked into an Apple iPad that belongs to a company's chief executive officer (CEO). The cybercriminal deleted some important files on the data volume that must be retrieved.

Which hidden folder will contain the digital evidence?

  1. /Private/etc
  2. /lost+found
  3. /.Trashes/501
  4. /etc

Answer(s): C

Explanation:

Comprehensive and Detailed Explanation From Exact Extract:

On Apple iOS devices, deleted files are often moved to a hidden Trash folder before permanent deletion. The directory /.Trashes/501 is a hidden folder where deleted files for user ID 501 (the first user created on macOS/iOS devices) are temporarily stored.

This folder can contain files marked for deletion and thus is a prime location for recovery attempts.

/lost+found is a directory commonly used on Unix/Linux file systems for recovered file fragments after file system corruption but is not the default trash location on iOS.

/Private/etc and /etc contain system configuration files, not deleted user files.


Reference:

Apple forensic investigations per NIST and training manuals such as those from Cellebrite and BlackBag Technologies indicate that user-deleted files on iOS devices reside in .Trashes or similar hidden directories until permanently removed.



Susan was looking at her credit report and noticed that several new credit cards had been opened lately in her name. Susan has not opened any of the credit card accounts herself.

Which type of cybercrime has been perpetrated against Susan?

  1. Identity theft
  2. SQL injection
  3. Cyberstalking
  4. Malware

Answer(s): A

Explanation:

Comprehensive and Detailed Explanation From Exact Extract:

Identity theft occurs when an attacker unlawfully obtains and uses another person's personal information to open accounts, access credit, or commit fraud. The opening of credit cards without the victim's consent is a classic example.

SQL injection is a web application attack method that does not directly relate to this case.

Cyberstalking involves harassment via digital means and is unrelated.

Malware is malicious software and may be used to facilitate identity theft but is not the crime itself.


Reference:

According to the U.S. Federal Trade Commission (FTC) definitions and NIST Cybersecurity Framework, identity theft is defined as the unauthorized use of someone's personal information for fraudulent purposes, perfectly matching Susan's situation.



A company has identified that a hacker has modified files on one of the company's computers. The IT department has collected the storage media from the hacked computer.

Which evidence should be obtained from the storage media to identify which files were modified?

  1. File timestamps
  2. Private IP addresses
  3. Public IP addresses
  4. Operating system version

Answer(s): A

Explanation:

Comprehensive and Detailed Explanation From Exact Extract:

File timestamps, including creation time, last modified time, and last accessed time, are fundamental metadata attributes stored with each file on a file system.
When files are modified, these timestamps usually update, providing direct evidence about when changes occurred. Examining file timestamps helps forensic investigators identify which files were altered and estimate the time of unauthorized activity.

IP addresses (private or public) are network-related evidence, not stored on the storage media's files directly.

Operating system version is system information but does not help identify specific file modifications.

Analysis of file timestamps is a standard forensic technique endorsed by NIST SP 800-86 (Guide to Integrating Forensic Techniques into Incident Response) for determining file activity and changes on digital media.



An organization has identified a system breach and has collected volatile data from the system.

Which evidence type should be collected next?

  1. Running processes
  2. Network connections
  3. Temporary data
  4. File timestamps

Answer(s): B

Explanation:

Comprehensive and Detailed Explanation From Exact Extract:

In incident response, after collecting volatile data (such as contents of RAM), the next priority is often to collect network-related evidence such as active network connections. Network connections can reveal ongoing communications, attacker activity, command and control channels, or data exfiltration paths.

Running processes and temporary data are also volatile but typically collected simultaneously or immediately after volatile memory.

File timestamps relate to non-volatile data and are collected later after volatile data acquisition to preserve evidence integrity.

This sequence is supported by NIST SP 800-86 and SANS Incident Handler's Handbook which emphasize the volatility of evidence and recommend capturing network state immediately after memory.



Where is the default location for 32-bit programs installed by a user on a 64-bit version of Windows 7?

  1. C:\ProgramData
  2. C:\Program files
  3. C:\Windows
  4. C:\Program files (x86)

Answer(s): D

Explanation:

Comprehensive and Detailed Explanation From Exact Extract:

On 64-bit versions of Windows operating systems (including Windows 7), 32-bit applications are installed by default into the folder C:\Program Files (x86). This separation allows the OS to distinguish between 64-bit and 32-bit applications and apply appropriate system calls and redirection.

C:\Program Files is reserved for native 64-bit applications.

C:\ProgramData contains application data shared across users.

C:\Windows contains system files, not program installations.

This structure is documented in Microsoft Windows Internals and Windows Forensics guides, including official NIST guidelines on Windows forensic investigations.



Viewing Page 1 of 11



Share your comments for WGU Digital-Forensics-in-Cybersecurity exam with other users:

Abhi 9/19/2023 1:22:00 PM

thanks for helping us
Anonymous


mrtom33 11/20/2023 4:51:00 AM

i prepared for the eccouncil 350-401 exam. i scored 92% on the test.
Anonymous


JUAN 6/28/2023 2:12:00 AM

aba questions to practice
UNITED STATES


LK 1/2/2024 11:56:00 AM

great content
Anonymous


Srijeeta 10/8/2023 6:24:00 AM

how do i get the remaining questions?
INDIA


Jovanne 7/26/2022 11:42:00 PM

well formatted pdf and the test engine software is free. well worth the money i sept.
ITALY


CHINIMILLI SATISH 8/29/2023 6:22:00 AM

looking for 1z0-116
Anonymous


Pedro Afonso 1/15/2024 8:01:00 AM

in question 22, shouldnt be in the data (option a) layer?
Anonymous


Pushkar 11/7/2022 12:12:00 AM

the questions are incredibly close to real exam. you people are amazing.
INDIA


Ankit S 11/13/2023 3:58:00 AM

q15. answer is b. simple
UNITED STATES


S. R 12/8/2023 9:41:00 AM

great practice
FRANCE


Mungara 3/14/2023 12:10:00 AM

thanks to this exam dumps, i felt confident and passed my exam with ease.
UNITED STATES


Anonymous 7/25/2023 2:55:00 AM

need 1z0-1105-22 exam
Anonymous


Nigora 5/31/2022 10:05:00 PM

this is a beautiful tool. passed after a week of studying.
UNITED STATES


Av dey 8/16/2023 2:35:00 PM

can you please upload the dumps for 1z0-1096-23 for oracle
INDIA


Mayur Shermale 11/23/2023 12:22:00 AM

its intresting, i would like to learn more abouth this
JAPAN


JM 12/19/2023 2:23:00 PM

q252: dns poisoning is the correct answer, not locator redirection. beaconing is detected from a host. this indicates that the system has been infected with malware, which could be the source of local dns poisoning. location redirection works by either embedding the redirection in the original websites code or having a user click on a url that has an embedded redirect. since users at a different office are not getting redirected, it isnt an embedded redirection on the original website and since the user is manually typing in the url and not clicking a link, it isnt a modified link.
UNITED STATES


Freddie 12/12/2023 12:37:00 PM

helpful dump questions
SOUTH AFRICA


Da Costa 8/25/2023 7:30:00 AM

question 423 eigrp uses metric
Anonymous


Bsmaind 8/20/2023 9:22:00 AM

hello nice dumps
Anonymous


beau 1/12/2024 4:53:00 PM

good resource for learning
UNITED STATES


Sandeep 12/29/2023 4:07:00 AM

very useful
Anonymous


kevin 9/29/2023 8:04:00 AM

physical tempering techniques
Anonymous


Blessious Phiri 8/15/2023 4:08:00 PM

its giving best technical knowledge
Anonymous


Testbear 6/13/2023 11:15:00 AM

please upload
ITALY


shime 10/24/2023 4:23:00 AM

great question with explanation thanks!!
ETHIOPIA


Thembelani 5/30/2023 2:40:00 AM

does this exam have lab sections?
Anonymous


Shin 9/8/2023 5:31:00 AM

please upload
PHILIPPINES


priti kagwade 7/22/2023 5:17:00 AM

please upload the braindump for .net
UNITED STATES


Robe 9/27/2023 8:15:00 PM

i need this exam 1z0-1107-2. please.
Anonymous


Chiranthaka 9/20/2023 11:22:00 AM

very useful!
Anonymous


Not Miguel 11/26/2023 9:43:00 PM

for this question - "which three type of basic patient or member information is displayed on the patient info component? (choose three.)", list of conditions is not displayed (it is displayed in patient card, not patient info). so should be thumbnail of chatter photo
Anonymous


Andrus 12/17/2023 12:09:00 PM

q52 should be d. vm storage controller bandwidth represents the amount of data (in terms of bandwidth) that a vms storage controller is using to read and write data to the storage fabric.
Anonymous


Raj 5/25/2023 8:43:00 AM

nice questions
UNITED STATES