Computer Science  >  QUESTIONS & ANSWERS  >  WGU C840 Digital Forensics in Cybersecurity Questions and Answers Already Passed (All)

WGU C840 Digital Forensics in Cybersecurity Questions and Answers Already Passed

Document Content and Description Below

WGU C840 Digital Forensics in Cybersecurity Questions and Answers Already Passed The Computer Security Act of 1987 ✔✔Passed to improve the security and privacy of sensitive information in fede ... ral computer systems. The law requires the establishment of minimum acceptable security practices, creation of computer security plans, and training of system users or owners of facilities that house sensitive information. The Foreign Intelligence Surveillance Act of 1978 (FISA) ✔✔A law that allows for collection of "foreign intelligence information" between foreign powers and agents of foreign powers using physical and electronic surveillance. A warrant is issued by a special court created by this Act for actions under this Act. The Child Protection and Sexual Predator Punishment Act of 1998 ✔✔Requires service providers that become aware of the storage or transmission of child pornography to report it to law enforcement. The Children's Online Privacy Protection Act of 1998 (COPPA) ✔✔Protects children 13 years of age and under from the collection and use of their personal information by Web sites. This act replaces the Child Online Protection Act of 1988 (COPA), which was determined to be unconstitutional. The Communications Decency Act of 1996 ✔✔Designed to protect persons 18 years of age and under from downloading or viewing material considered indecent. This act has been subject to court cases that subsequently changed some definitions and penalties The Telecommunications Act of 1996 ✔✔Includes many provisions relative to the privacy and disclosure of information in motion through and across telephony and computer networks. The Wireless Communications and Public Safety Act of 1999 ✔✔Allows for collection and use of "empty" communications, which means nonverbal and nontext communications, such as GPS information. The USA Patriot Act ✔✔The primary law under which a wide variety of Internet and communications information content and metadata is currently collected. Provisions exist within the Act to protect the identity and privacy of U.S. citizens The Sarbanes-Oxley Act of 2002 (SOX) ✔✔Contains many provisions about record-keeping and destruction of electronic records relating to the management and operation of publicly held companies. Anti-forensics ✔✔The actions that perpetrators take to conceal their locations, activities, or identities. Cell-phone forensics ✔✔The process of searching the contents of cell phones. Chain of custody ✔✔The continuity of control of evidence that makes it possible to account for all that has happened to evidence between its original collection and its appearance in court, preferably unaltered Computer forensics ✔✔The use of analytical and investigative techniques to identify, collect, examine and preserve computer-based material for presentation as evidence in a court of law Curriculum Vitae (CV) ✔✔An extensive document expounding one's experience and qualifications for a position, similar to a resume but with more detail. In academia and expert work, a CV is usually used rather than a resume Daubert Standard ✔✔The standard holding that only methods and tools widely accepted in the scientific community can be used in court. Demonstrative Evidence ✔✔Information that helps explain other evidence. And example is a chart that explains a technical concept to the judge and jury Digital Evidence ✔✔Information that has been processed and assembled so that it is relevant to an investigation and supports a specific finding or determination Disk Forensics ✔✔The process of acquiring and analyzing information stored on physical storage media, such as computer hard drives or smartphones Documentary Evidence ✔✔Data stored in written form, on paper or in electronic files, such as email messages and telephone call-detail records. Investigators must authenticate documentary evidence. Email Forensics ✔✔The study of the source and content of email as evidence, including the identification of the sender, recipient, date, time, [Show More]

Last updated: 3 years ago

Preview 1 out of 4 pages

Buy Now

Instant download

We Accept:

Payment methods accepted on Scholarfriends (We Accept)
Preview image of WGU C840 Digital Forensics in Cybersecurity Questions and Answers Already Passed document

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

Payment methods accepted on Scholarfriends (We Accept)

Also available in bundle (1)

Click Below to Access Bundle(s)

WGU Course C840 - Digital Forensics in Cyber security Bundled Questions and Answers All Graded A+

WGU Course C840 - Digital Forensics in Cyber security Bundled Questions and Answers All Graded A+

By Nutmegs 3 years ago

$20

8  

Reviews( 0 )

$8.00

Buy Now

We Accept:

Payment methods accepted on Scholarfriends (We Accept)

Instant download

Can't find what you want? Try our AI powered Search

219
1

Document information


Connected school, study & course


About the document


Uploaded On

Aug 16, 2022

Number of pages

4

Written in

All

Seller


Profile illustration for Nutmegs
Nutmegs

Member since 4 years

607 Documents Sold

Reviews Received
77
14
8
2
21
Additional information

This document has been written for:

Uploaded

Aug 16, 2022

Downloads

 1

Views

 219

Document Keyword Tags


$8.00
What is Scholarfriends

Scholarfriends.com Online Platform by Browsegrades Inc. 651N South Broad St, Middletown DE. United States.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Scholarfriends · High quality services·