ACTUAL VERSION A WITH STUDY GUIDE COMPLETE
350 QUESTIONS AND CORRECT VERIFIED ANSWERS
ALREADY GRADED A+
American Standard Code for Information Interchange (ASCII) - ..(answers)..A set of
codes defining all the various keystrokes you could make, including letters,
numbers, characters, and even the spacebar and return keys.
Anonymous remailing - ..(answers)..The process of sending an email message to
an anonymizer. The anonymizer strips identifying information from an email
message before forwarding it with the anonymous mailing computer's IP address.
Anti-forensics - ..(answers)..The actions that perpetrators take to conceal their
locations, activities, or identities.
Asymmetric cryptography - ..(answers)..Cryptography wherein two keys are used:
one to encrypt the message and another to decrypt it.
Asynchronous transfer mode (ATM) - ..(answers)..A high-speed connection
technology that uses fixed-length, 53-byte packets called calls.
Authenticate - ..(answers)..To verify the identity of a person, or to verify evidence.
,Base transceiver station (BTS) - ..(answers)..The part of the cell network
responsible for communications between the mobile phone and the network
switching system.
Basic input/output system (BIOS) - ..(answers)..The basic instructions stored on a
chip for booting up the computer.
Bit-level information - ..(answers)..Information at the level of actual 1s and 0s
stored in memory or on the storage device.
Block cipher - ..(answers)..A form of cryptography that encrypts data in blocks; 64-
bit blocks are quite common, although some algorithms (like AES) use larger
blocks.
Bootstrap environment - ..(answers)..A special program, such as U-Boot or
RedBoot, that is stored in a special section of the flash memory.
Brute-force attack - ..(answers)..An attack in which the attacker tries to decrypt a
message by simply applying every possible key in the keyspace.
Business continuity plan (BCP) - ..(answers)..A plan for maintaining minimal
operations until the business can return to full normal operations.
Business impact analysis (BIA) - ..(answers)..An analysis of how specific incidents
might impact the business operations.
,Caesar cipher - ..(answers)..The method of cryptography in which someone
chooses a number by which to shift each letter of a text in the alphabet and
substitute the new letter for the letter being encrypted. This is also known as a
Mono alphabet, single-alphabet, or substitution cipher.
Carrier - ..(answers)..The signal, stream, or data file in which the payload is
hidden.
Cell-phone forensics - ..(answers)..The process of searching the contents of cell
phones.
Chain of custody - ..(answers)..The continuity of control of evidence that makes it
possible to account for all that has happened to evidence between its original
collection and its appearance in court, preferably unaltered.
Channel - ..(answers)..The type of medium used to hide data in steganography.
This may be photos, video, sound files, or Voice over IP.
Clean room - ..(answers)..An environment that has a controlled level of
contamination, such as from dust, microbes, and other particles.
Cloud computing - ..(answers)..The practice of delivering hosted services over the
internet. This can be software as a service, platform as a service, or infrastructure
as a service.
, Computer forensics - ..(answers)..The use of analytical and investigative
techniques to identify, collect, examine, and preserve computer-based material
for presentation as evidence in a court of law.
Consistency checking - ..(answers)..A technique for file system repair that involves
scanning a disk's logical structure and ensuring that it is consistent with its
specification.
Cryptanalysis - ..(answers)..A method of using techniques other than brute force
to derive a cryptographic key.
Curriculum vitae (CV) - ..(answers)..An extensive document expounding one's
experience and qualifications for a position, similar to a résumé but with more
detail. In academia and expert work, it is usually used rather than a résumé.
Cyberstalking - ..(answers)..The use of electronic communications to harass or
threaten another person.
Data consistency - ..(answers)..The act of ensuring the data that is extracted is
consistent.
Daubert standard - ..(answers)..The standard holding that only methods and tools
widely accepted in the scientific community can be used in court.