WGU Digital-Forensics-in-Cybersecurity Exam (page: 2)
WGU Digital Forensics in Cybersecurity (D431/C840) Course
Updated on: 24-Mar-2026

Which principle of evidence collection states that access to evidence must be tracked from the time it is seized through its use in court?

  1. Evidence record
  2. Chain of custody
  3. Event log
  4. Audit log

Answer(s): B

Explanation:

Comprehensive and Detailed Explanation From Exact Extract:

The Chain of Custody (CoC) is the documented and unbroken transfer record of evidence handling, from seizure to presentation in court. It ensures that the evidence has been preserved, controlled, and protected from tampering or alteration.

Evidence record documents evidence details but is less formal than CoC.

Event log and audit log are system-generated records and do not replace the formal CoC.

CoC is a fundamental forensic principle as outlined by NIST SP 800-86 and the Scientific Working Group on Digital Evidence (SWGDE) best practices, ensuring evidence admissibility and reliability in legal proceedings.



A forensics investigator is investigating a Windows computer which may be collecting data from other computers on the network.

Which Windows command line tool can be used to determine connections between machines?

  1. Telnet
  2. Xdetect
  3. Openfiles
  4. Netstat

Answer(s): D

Explanation:

Comprehensive and Detailed Explanation From Exact Extract:

Netstat is a standard Windows command line utility that displays active network connections, routing tables, and network interface statistics. It is widely used in forensic investigations to identify current and past TCP/IP connections, including IP addresses and port numbers associated with remote hosts. This information helps investigators identify if the suspect computer has active connections to other machines potentially used for data collection or command and control.

Telnet is a protocol used to connect to remote machines but does not display current network connections.

Openfiles shows files opened remotely but not network connection details.

Xdetect is not a standard Windows tool and not recognized in forensic investigations.


Reference:

According to NIST SP 800-86 and SANS Digital Forensics guidelines, netstat is an essential tool for gathering network-related evidence during system investigations.



A forensic specialist is about to collect digital evidence from a suspect's computer hard drive. The computer is off.

What should be the specialist's first step?

  1. Carefully review the chain of custody form.
  2. Turn the computer on and remove any malware.
  3. Make a forensic copy of the computer's hard drive.
  4. Turn the computer on and photograph the desktop.

Answer(s): A

Explanation:

Comprehensive and Detailed Explanation From Exact Extract:

Before any action on evidence, especially when seizing or processing digital devices, the forensic specialist must first carefully review and document the chain of custody (CoC) to ensure proper handling and legal compliance. This includes verifying seizure procedures and documenting the status of the device before any interaction.

Turning the computer on prematurely risks altering or destroying volatile data.

Making a forensic copy (imaging) can only happen after proper documentation and preservation steps.

Photographing the desktop is relevant only after power-on but only if approved and documented.

This process aligns with NIST guidelines (SP 800-86) and the Scientific Working Group on Digital Evidence (SWGDE) principles emphasizing preservation and documentation as foundational steps.



A forensic scientist is examining a computer for possible evidence of a cybercrime.

Why should the forensic scientist copy files at the bit level instead of the OS level when copying files from the computer to a forensic computer?

  1. Copying files at the OS level fails to copy deleted files or slack space.
  2. Copying files at the OS level takes too long to be practical.
  3. Copying files at the OS level changes the timestamp of the files.
  4. Copying files at the OS level will copy extra information that is unnecessary.

Answer(s): A

Explanation:

Comprehensive and Detailed Explanation From Exact Extract:

Bit-level (or bit-stream) copying captures every bit on the storage media, including files, deleted files, slack space (unused space within a cluster), and unallocated space. This ensures all digital evidence, including artifacts not visible at the OS level, is preserved for analysis.

Copying at the OS level captures only allocated files visible in the file system, missing deleted files and slack space.

Bit-level copying is a cornerstone of forensic best practices as specified in NIST SP 800-86 and SWGDE guidelines.

Timestamp changes and unnecessary information issues are secondary concerns compared to the completeness of evidence.



Which storage format is a magnetic drive?

  1. CD-ROM
  2. SATA
  3. Blu-ray
  4. SSD

Answer(s): B

Explanation:

Comprehensive and Detailed Explanation From Exact Extract:

SATA (Serial ATA) refers to an interface standard commonly used for connecting magnetic hard disk drives (HDDs) and solid-state drives (SSDs) to a computer. The term SATA itself describes the connection, but most HDDs that use SATA as an interface are magnetic drives.

CD-ROM and Blu-ray are optical storage media, not magnetic.

SSD (Solid State Drive) uses flash memory, not magnetic storage.

Magnetic drives rely on spinning magnetic platters, which are typically connected via SATA or other interfaces.

This differentiation is emphasized in digital forensic training and hardware documentation, including those from NIST and forensic hardware textbooks.



Which description applies to the Advanced Forensic Format (AFF)?

  1. An open file standard developed by AccessData
  2. A proprietary format used by the iLook tool
  3. An open file standard used by Sleuth Kit and Autopsy
  4. A proprietary format developed by Guidance Software

Answer(s): C

Explanation:

Comprehensive and Detailed Explanation From Exact Extract:

The Advanced Forensic Format (AFF) is an open file format designed for storing disk images and related forensic metadata. It was developed by the Sleuth Kit community and is supported by forensic tools such as Sleuth Kit and Autopsy. AFF allows efficient storage, compression, and metadata annotation, which makes it suitable for forensic investigations.

AccessData is known for FTK format, not AFF.

iLook uses proprietary formats unrelated to AFF.

Guidance Software developed the EnCase Evidence File (E01) format.

AFF is widely recognized in open-source forensic toolchains.


Reference:

The AFF format and its use with Sleuth Kit and Autopsy are documented in digital forensics literature and the AFF official documentation, as endorsed by the NIST and forensic tool developer communities.



Which term describes the used space between the end of a file and the end of the last cluster assigned to the file?

  1. Unallocated space
  2. Volume slack
  3. Host protected area
  4. File slack

Answer(s): D

Explanation:

Comprehensive and Detailed Explanation From Exact Extract:

File slack is the space between the logical end of a file and the physical end of the last cluster allocated to the file. This space may contain residual data from previously deleted files or fragments, making it significant in forensic investigations.

Unallocated space refers to clusters not currently assigned to any file.

Volume slack includes slack space at the volume level but is less specific.

Host protected area is a reserved part of the disk for system use, unrelated to slack space.

File slack is a recognized forensic artifact often examined for hidden data or remnants.


Reference:

This concept is extensively described in forensic textbooks and NIST publications on file systems, including SP 800-86 and SWGDE best practices.



How is the Windows swap file, also known as page file, used?

  1. Replaces bad sectors
  2. Primarily for security
  3. Augments the RAM
  4. Reserved for system files

Answer(s): C

Explanation:

Comprehensive and Detailed Explanation From Exact Extract:

The Windows swap file, or page file, is a system file used to extend physical memory by storing data that cannot fit into the RAM.
When RAM is full, the OS swaps inactive data pages to this file, thus augmenting RAM capacity.

It does not replace bad sectors; that function is for disk management utilities.

It is not primarily for security but for memory management.

It is not reserved exclusively for system files but is used dynamically for memory paging.


Reference:

Microsoft's official documentation and forensic guides like NIST SP 800-86 describe the page file's role in virtual memory management and its importance in forensic analysis because it may contain fragments of memory and sensitive information.



Viewing Page 2 of 11



Share your comments for WGU Digital-Forensics-in-Cybersecurity exam with other users:

JM 12/19/2023 1:22:00 PM

answer to 134 is casb. while data loss prevention is the goal, in order to implement dlp in cloud applications you need to deploy a casb.
UNITED STATES


Neo 7/26/2023 9:36:00 AM

are these brain dumps sufficient enough to go write exam after practicing them? or does one need more material this wont be enough?
SOUTH AFRICA


Bilal 8/22/2023 6:33:00 AM

i did attend the required cources and i need to be sure that i am ready to take the exam, i would ask you please to share the questions, to be sure that i am fit to proceed with taking the exam.
Anonymous


John 11/12/2023 8:48:00 PM

why only give explanations on some, and not all questions and their respective answers?
UNITED STATES


Biswa 11/20/2023 8:50:00 AM

refresh db knowledge
Anonymous


Shalini Sharma 10/17/2023 8:29:00 AM

interested for sap certification
JAPAN


ethan 9/24/2023 12:38:00 PM

could you please upload practice questions for scr exam ?
HONG KONG


vijay joshi 8/19/2023 3:15:00 AM

please upload free oracle cloud infrastructure 2023 foundations associate exam braindumps
Anonymous


Ayodele Talabi 8/25/2023 9:25:00 PM

sweating! they are tricky
CANADA


Romero 3/23/2022 4:20:00 PM

i never use these dumps sites but i had to do it for this exam as it is impossible to pass without using these question dumps.
UNITED STATES


John Kennedy 9/20/2023 3:33:00 AM

good practice and well sites.
Anonymous


Nenad 7/12/2022 11:05:00 PM

passed my first exam last week and pass the second exam this morning. thank you sir for all the help and these brian dumps.
INDIA


Lucky 10/31/2023 2:01:00 PM

does anyone who attended exam csa 8.8, can confirm these questions are really coming ? or these are just for practicing?
HONG KONG


Prateek 9/18/2023 11:13:00 AM

kindly share the dumps
UNITED STATES


Irfan 11/25/2023 1:26:00 AM

very nice content
Anonymous


php 6/16/2023 12:49:00 AM

passed today
Anonymous


Durga 6/23/2023 1:22:00 AM

hi can you please upload questions
Anonymous


JJ 5/28/2023 4:32:00 AM

please upload quetions
THAILAND


Norris 1/3/2023 8:06:00 PM

i passed my exam thanks to this braindumps questions. these questions are valid in us and i highly recommend it!
UNITED STATES


abuti 7/21/2023 6:10:00 PM

are they truely latest
Anonymous


Curtis Nakawaki 7/5/2023 8:46:00 PM

questions appear contemporary.
UNITED STATES


Vv 12/2/2023 6:31:00 AM

good to prepare in this site
UNITED STATES


praveenkumar 11/20/2023 11:57:00 AM

very helpful to crack first attempt
Anonymous


asad Raza 5/15/2023 5:38:00 AM

please upload this exam
CHINA


Reeta 7/17/2023 5:22:00 PM

please upload the c_activate22 dump questions with answer
SWEDEN


Wong 12/20/2023 11:34:00 AM

q10 - the answer should be a. if its c, the criteria will meet if either the prospect is not part of the suppression lists or if the job title contains vice president
MALAYSIA


david 12/12/2023 12:38:00 PM

this was on the exam as of 1211/2023
Anonymous


Tink 7/24/2023 9:23:00 AM

great for prep
GERMANY


Jaro 12/18/2023 3:12:00 PM

i think in question 7 the first answer should be power bi portal (not power bi)
Anonymous


9eagles 4/7/2023 10:04:00 AM

on question 10 and so far 2 wrong answers as evident in the included reference link.
Anonymous


Tai 8/28/2023 5:28:00 AM

wonderful material
SOUTH AFRICA


VoiceofMidnight 12/29/2023 4:48:00 PM

i passed!! ...but barely! got 728, but needed 720 to pass. the exam hit me with labs right out of the gate! then it went to multiple choice. protip: study the labs!
UNITED STATES


A K 8/3/2023 11:56:00 AM

correct answer for question 92 is c -aws shield
Anonymous


Nitin Mindhe 11/27/2023 6:12:00 AM

great !! it is really good
IRELAND