WGU D431 - Digital Forensics in Cybersecurity
|| || || || || || ||
Exam with precise detailed answers || || || ||
American Standard Code for Information Interchange (ASCII)
|| || || || || ||
A set of codes defining all the various keystrokes you could make, including letters, numbers,
|| || || || || || || || || || || || || || ||
characters, and even the spacebar and return keys.
|| || || || || || ||
Anonymous remailing ||
The process of sending an email message to an anonymizer. The anonymizer strips identifying
|| || || || || || || || || || || || || ||
information from an email message before forwarding it with the anonymous mailing computer's
|| || || || || || || || || || || || ||
IP address.
||
Anti-forensics
The actions that perpetrators take to conceal their locations, activities, or identities.
|| || || || || || || || || || ||
Asymmetric cryptography ||
Cryptography wherein two keys are used: one to encrypt the message and another to decrypt it.
|| || || || || || || || || || || || || || ||
Asynchronous transfer mode (ATM) || || ||
A high-speed connection technology that uses fixed-length, 53-byte packets called calls.
|| || || || || || || || || ||
Authenticate
,2
To verify the identity of a person, or to verify evidence.
|| || || || || || || || || ||
Base transceiver station (BTS)
|| || ||
The part of the cell network responsible for communications between the mobile phone and the
|| || || || || || || || || || || || || || ||
network switching system. || ||
Basic input/output system (BIOS)
|| || ||
The basic instructions stored on a chip for booting up the computer.
|| || || || || || || || || || ||
Bit-level information ||
Information at the level of actual 1s and 0s stored in memory or on the storage device.
|| || || || || || || || || || || || || || || ||
Block cipher ||
A form of cryptography that encrypts data in blocks; 64-bit blocks are quite common, although
|| || || || || || || || || || || || || || ||
some algorithms (like AES) use larger blocks.
|| || || || || ||
Bootstrap environment ||
A special program, such as U-Boot or RedBoot, that is stored in a special section of the flash
|| || || || || || || || || || || || || || || || || ||
memory.
Brute-force attack ||
,2
An attack in which the attacker tries to decrypt a message by simply applying every possible key
|| || || || || || || || || || || || || || || || ||
in the keyspace.
|| ||
Business continuity plan (BCP) || || ||
A plan for maintaining minimal operations until the business can return to full normal operations.
|| || || || || || || || || || || || || ||
Business impact analysis (BIA) || || ||
An analysis of how specific incidents might impact the business operations.
|| || || || || || || || || ||
Caesar cipher ||
The method of cryptography in which someone chooses a number by which to shift each letter of
|| || || || || || || || || || || || || || || || ||
a text in the alphabet and substitute the new letter for the letter being encrypted. For example, if
|| || || || || || || || || || || || || || || || || ||
your text is "A CAT," and you choose to shift by two letters, your encrypted text is "C ECV." This
|| || || || || || || || || || || || || || || || || || || ||
is also known as a monoalphabet, single-alphabet, or substitution cipher.
|| || || || || || || || ||
Carrier
The signal, stream, or data file in which the payload is hidden.
|| || || || || || || || || || ||
Cell-phone forensics ||
The process of searching the contents of cell phones.
|| || || || || || || ||
Chain of custody || ||
, 2
The continuity of control of evidence that makes it possible to account for all that has happened to
|| || || || || || || || || || || || || || || || ||
evidence between its original collection and its appearance in court, preferably unaltered.
|| || || || || || || || || || || ||
Channel
The type of medium used to hide data in steganography. This may be photos, video, sound files,
|| || || || || || || || || || || || || || || || ||
or Voice over IP.
|| || ||
Clean room ||
An environment that has a controlled level of contamination, such as from dust, microbes, and
|| || || || || || || || || || || || || || ||
other particles. ||
Cloud computing ||
The practice of delivering hosted services over the internet. This can be software as a service,
|| || || || || || || || || || || || || || || ||
platform as a service, or infrastructure as a service.
|| || || || || || || ||
Computer forensics ||
The use of analytical and investigative techniques to identify, collect, examine, and preserve
|| || || || || || || || || || || || ||
computer-based material for presentation as evidence in a court of law. || || || || || || || || || ||
Consistency checking ||
A technique for file system repair that involves scanning a disk's logical structure and ensuring
|| || || || || || || || || || || || || || ||
that it is consistent with its specification.
|| || || || || ||