FINAL SCRIPT 2026 COMPLETE QUESTIONS
WITH ANSWERS
◉ Dump. Answer: A complete copy of every bit of memory or cache
recorded in permanent storage or printed on paper.
◉ Electronic serial number (ESN). Answer: A unique identification
number developed by the U.S. Federal Communications Commission
(FCC) to identify cell phones.
◉ Email forensics. Answer: The study of the source and content of
email as evidence, including the identification of the sender,
recipient, date, time, and origination location of an email message.
◉ Enhanced data rates for GSM evolution (EDGE). Answer: A
technology that does not fit neatly into the 2G/3G/4G spectrum. It is
technically considered pre-3G but was an improvement on GSM
(2G).
◉ Euler's Totient. Answer: The total number of coprime numbers.
Two numbers are considered coprime if they have no common
factors.
,◉ Expert report. Answer: A formal document prepared by a
forensics specialist to document an investigation, including a list of
all tests conducted as well as the specialist's own curriculum vitae
(CV). Anything the specialist plans to testify about at a trial must be
included in the expert report.
◉ Expert testimony. Answer: The testimony of an expert witness,
one who testifies on the basis of scientific or technical knowledge
relevant to a case, rather than personal experience.
◉ Feistel function. Answer: A cryptographic function that splits
blocks of data into two parts. It is one of the most influential
developments in symmetric block ciphers.
◉ File allocation table (FAT). Answer: The table used to store
cluster/file information.
◉ File slack. Answer: The unused space between the logical end of
file and the physical end of file. It is also called slack space.
◉ Foreign Intelligence Surveillance Act of 1978 (FISA). Answer: A
U.S. law that prescribes procedures for the physical and electronic
surveillance and collection of "foreign intelligence information"
between foreign powers and agents of foreign powers, which may
include U.S. citizens and permanent residents suspected of
espionage or terrorism.
,◉ Fraud. Answer: A broad category of crime that can encompass
many different activities, but essentially any attempt to gain
financial reward through deception.
◉ Global System for Mobile (GSM) communications. Answer: A
standard developed by the European Telecommunications Standards
Institute (ETSI). Basically, it is the 2G network.
◉ Grand Unified Bootloader (GRUB). Answer: A newer Linux boot
loader.
◉ Graphical user interface (GUI). Answer: A point-and-click user
interface.
◉ grep. Answer: A popular Linux/UNIX search tool.
◉ Hash. Answer: A function that is nonreversible, takes variable-
length input, produces fixed-length output, and has few or no
collisions.
◉ Heap (H). Answer: Dynamic memory for a program comes from
the heap segment. A process may use a memory allocator such as
malloc to request dynamic memory.
, ◉ Hierarchical storage management (HSM). Answer: Continuous
online backup storage.
◉ High-level format. Answer: Setting up an empty file system and
installing a boot sector in a drive. Also called a quick format.
◉ Hive. Answer: One of the five sections of the Windows Registry.
◉ Home location register (HLR). Answer: The database used by the
MSC for subscriber data and service information.
◉ Identity theft. Answer: Any use of another person's identity.
◉ Inode. Answer: A data structure in the file system that stores all
the information about a file except its name and its actual data.
◉ Integrated circuit card identifier (ICCID). Answer: A unique serial
number that identifies each SIM. These numbers are engraved on
the SIM during manufacturing.
◉ International Mobile Equipment Identity (IMEI) number. Answer:
A unique number identifying GSM, LTE, and other types of phones.