WGU Digital-Forensics-in-Cybersecurity Exam (page: 2)
WGU Digital Forensics in Cybersecurity (D431/C840) Course
Updated on: 07-Feb-2026

Which principle of evidence collection states that access to evidence must be tracked from the time it is seized through its use in court?

  1. Evidence record
  2. Chain of custody
  3. Event log
  4. Audit log

Answer(s): B

Explanation:

Comprehensive and Detailed Explanation From Exact Extract:

The Chain of Custody (CoC) is the documented and unbroken transfer record of evidence handling, from seizure to presentation in court. It ensures that the evidence has been preserved, controlled, and protected from tampering or alteration.

Evidence record documents evidence details but is less formal than CoC.

Event log and audit log are system-generated records and do not replace the formal CoC.

CoC is a fundamental forensic principle as outlined by NIST SP 800-86 and the Scientific Working Group on Digital Evidence (SWGDE) best practices, ensuring evidence admissibility and reliability in legal proceedings.



A forensics investigator is investigating a Windows computer which may be collecting data from other computers on the network.

Which Windows command line tool can be used to determine connections between machines?

  1. Telnet
  2. Xdetect
  3. Openfiles
  4. Netstat

Answer(s): D

Explanation:

Comprehensive and Detailed Explanation From Exact Extract:

Netstat is a standard Windows command line utility that displays active network connections, routing tables, and network interface statistics. It is widely used in forensic investigations to identify current and past TCP/IP connections, including IP addresses and port numbers associated with remote hosts. This information helps investigators identify if the suspect computer has active connections to other machines potentially used for data collection or command and control.

Telnet is a protocol used to connect to remote machines but does not display current network connections.

Openfiles shows files opened remotely but not network connection details.

Xdetect is not a standard Windows tool and not recognized in forensic investigations.


Reference:

According to NIST SP 800-86 and SANS Digital Forensics guidelines, netstat is an essential tool for gathering network-related evidence during system investigations.



A forensic specialist is about to collect digital evidence from a suspect's computer hard drive. The computer is off.

What should be the specialist's first step?

  1. Carefully review the chain of custody form.
  2. Turn the computer on and remove any malware.
  3. Make a forensic copy of the computer's hard drive.
  4. Turn the computer on and photograph the desktop.

Answer(s): A

Explanation:

Comprehensive and Detailed Explanation From Exact Extract:

Before any action on evidence, especially when seizing or processing digital devices, the forensic specialist must first carefully review and document the chain of custody (CoC) to ensure proper handling and legal compliance. This includes verifying seizure procedures and documenting the status of the device before any interaction.

Turning the computer on prematurely risks altering or destroying volatile data.

Making a forensic copy (imaging) can only happen after proper documentation and preservation steps.

Photographing the desktop is relevant only after power-on but only if approved and documented.

This process aligns with NIST guidelines (SP 800-86) and the Scientific Working Group on Digital Evidence (SWGDE) principles emphasizing preservation and documentation as foundational steps.



A forensic scientist is examining a computer for possible evidence of a cybercrime.

Why should the forensic scientist copy files at the bit level instead of the OS level when copying files from the computer to a forensic computer?

  1. Copying files at the OS level fails to copy deleted files or slack space.
  2. Copying files at the OS level takes too long to be practical.
  3. Copying files at the OS level changes the timestamp of the files.
  4. Copying files at the OS level will copy extra information that is unnecessary.

Answer(s): A

Explanation:

Comprehensive and Detailed Explanation From Exact Extract:

Bit-level (or bit-stream) copying captures every bit on the storage media, including files, deleted files, slack space (unused space within a cluster), and unallocated space. This ensures all digital evidence, including artifacts not visible at the OS level, is preserved for analysis.

Copying at the OS level captures only allocated files visible in the file system, missing deleted files and slack space.

Bit-level copying is a cornerstone of forensic best practices as specified in NIST SP 800-86 and SWGDE guidelines.

Timestamp changes and unnecessary information issues are secondary concerns compared to the completeness of evidence.



Which storage format is a magnetic drive?

  1. CD-ROM
  2. SATA
  3. Blu-ray
  4. SSD

Answer(s): B

Explanation:

Comprehensive and Detailed Explanation From Exact Extract:

SATA (Serial ATA) refers to an interface standard commonly used for connecting magnetic hard disk drives (HDDs) and solid-state drives (SSDs) to a computer. The term SATA itself describes the connection, but most HDDs that use SATA as an interface are magnetic drives.

CD-ROM and Blu-ray are optical storage media, not magnetic.

SSD (Solid State Drive) uses flash memory, not magnetic storage.

Magnetic drives rely on spinning magnetic platters, which are typically connected via SATA or other interfaces.

This differentiation is emphasized in digital forensic training and hardware documentation, including those from NIST and forensic hardware textbooks.



Which description applies to the Advanced Forensic Format (AFF)?

  1. An open file standard developed by AccessData
  2. A proprietary format used by the iLook tool
  3. An open file standard used by Sleuth Kit and Autopsy
  4. A proprietary format developed by Guidance Software

Answer(s): C

Explanation:

Comprehensive and Detailed Explanation From Exact Extract:

The Advanced Forensic Format (AFF) is an open file format designed for storing disk images and related forensic metadata. It was developed by the Sleuth Kit community and is supported by forensic tools such as Sleuth Kit and Autopsy. AFF allows efficient storage, compression, and metadata annotation, which makes it suitable for forensic investigations.

AccessData is known for FTK format, not AFF.

iLook uses proprietary formats unrelated to AFF.

Guidance Software developed the EnCase Evidence File (E01) format.

AFF is widely recognized in open-source forensic toolchains.


Reference:

The AFF format and its use with Sleuth Kit and Autopsy are documented in digital forensics literature and the AFF official documentation, as endorsed by the NIST and forensic tool developer communities.



Which term describes the used space between the end of a file and the end of the last cluster assigned to the file?

  1. Unallocated space
  2. Volume slack
  3. Host protected area
  4. File slack

Answer(s): D

Explanation:

Comprehensive and Detailed Explanation From Exact Extract:

File slack is the space between the logical end of a file and the physical end of the last cluster allocated to the file. This space may contain residual data from previously deleted files or fragments, making it significant in forensic investigations.

Unallocated space refers to clusters not currently assigned to any file.

Volume slack includes slack space at the volume level but is less specific.

Host protected area is a reserved part of the disk for system use, unrelated to slack space.

File slack is a recognized forensic artifact often examined for hidden data or remnants.


Reference:

This concept is extensively described in forensic textbooks and NIST publications on file systems, including SP 800-86 and SWGDE best practices.



How is the Windows swap file, also known as page file, used?

  1. Replaces bad sectors
  2. Primarily for security
  3. Augments the RAM
  4. Reserved for system files

Answer(s): C

Explanation:

Comprehensive and Detailed Explanation From Exact Extract:

The Windows swap file, or page file, is a system file used to extend physical memory by storing data that cannot fit into the RAM.
When RAM is full, the OS swaps inactive data pages to this file, thus augmenting RAM capacity.

It does not replace bad sectors; that function is for disk management utilities.

It is not primarily for security but for memory management.

It is not reserved exclusively for system files but is used dynamically for memory paging.


Reference:

Microsoft's official documentation and forensic guides like NIST SP 800-86 describe the page file's role in virtual memory management and its importance in forensic analysis because it may contain fragments of memory and sensitive information.



Viewing Page 2 of 11



Share your comments for WGU Digital-Forensics-in-Cybersecurity exam with other users:

Michelle 6/23/2023 4:08:00 AM

can you please upload it back?
Anonymous


Ajay 10/3/2023 12:17:00 PM

could you please re-upload this exam? thanks a lot!
Anonymous


him 9/30/2023 2:38:00 AM

great about shared quiz
Anonymous


San 11/14/2023 12:46:00 AM

goood helping
Anonymous


Wang 6/9/2022 10:05:00 PM

pay attention to questions. they are very tricky. i waould say about 80 to 85% of the questions are in this exam dump.
UNITED STATES


Mary 5/16/2023 4:50:00 AM

wish you would allow more free questions
Anonymous


thomas 9/12/2023 4:28:00 AM

great simulation
Anonymous


Sandhya 12/9/2023 12:57:00 AM

very g inood
Anonymous


Agathenta 12/16/2023 1:36:00 PM

q35 should be a
Anonymous


MD. SAIFUL ISLAM 6/22/2023 5:21:00 AM

sap c_ts450_2021
Anonymous


Satya 7/24/2023 3:18:00 AM

nice questions
UNITED STATES


sk 5/13/2023 2:10:00 AM

ecellent materil for unserstanding
INDIA


Gerard 6/29/2023 11:14:00 AM

good so far
Anonymous


Limbo 10/9/2023 3:08:00 AM

this is way too informative
BOTSWANA


Tejasree 8/26/2023 1:46:00 AM

very helpfull
UNITED STATES


Yolostar Again 10/12/2023 3:02:00 PM

q.189 - answers are incorrect.
Anonymous


Shikha Bakra 9/10/2023 5:16:00 PM

awesome job in getting these questions
AUSTRALIA


Kevin 10/20/2023 2:01:00 AM

i cant find aws certified practitioner clf-c01 exam in aws website but i found aws certified practitioner clf-c02 exam. can everyone please verify the difference between the two clf-c01 and clf-c02? thank you
UNITED STATES


D Mario 6/19/2023 10:38:00 PM

grazie mille. i got a satisfactory mark in my exam test today because of this exam dumps. sorry for my english.
ITALY


Bharat Kumar Saraf 10/31/2023 4:36:00 AM

some of the answers are incorrect. need to be reviewed.
HONG KONG


JP 7/13/2023 12:21:00 PM

so far so good
Anonymous


Kiky V 8/8/2023 6:32:00 PM

i am really liking it
Anonymous


trying 7/28/2023 12:37:00 PM

thanks good stuff
UNITED STATES


exampei 10/4/2023 2:40:00 PM

need dump c_tadm_23
Anonymous


Eman Sawalha 6/10/2023 6:18:00 AM

next time i will write a full review
GREECE


johnpaul 11/15/2023 7:55:00 AM

first time using this site
ROMANIA


omiornil@gmail.com 7/25/2023 9:36:00 AM

please sent me oracle 1z0-1105-22 pdf
BANGLADESH


John 8/29/2023 8:59:00 PM

very helpful
Anonymous


Kvana 9/28/2023 12:08:00 PM

good info about oml
UNITED STATES


Checo Lee 7/3/2023 5:45:00 PM

very useful to practice
UNITED STATES


dixitdnoh@gmail.com 8/27/2023 2:58:00 PM

this website is very helpful.
UNITED STATES


Sanjay 8/14/2023 8:07:00 AM

good content
INDIA


Blessious Phiri 8/12/2023 2:19:00 PM

so challenging
Anonymous


PAYAL 10/17/2023 7:14:00 AM

17 should be d ,for morequery its scale out
Anonymous