100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
WGU D432 – DIGITAL FORENSICS IN CYBERSECURITY ACTUAL REAL EXAM CORRECT QUESTIONS AND ANSWERS 2024. $27.99   Add to cart

Exam (elaborations)

WGU D432 – DIGITAL FORENSICS IN CYBERSECURITY ACTUAL REAL EXAM CORRECT QUESTIONS AND ANSWERS 2024.

 1 view  0 purchase
  • Course
  • Institution

WGU D432 – DIGITAL FORENSICS IN CYBERSECURITY ACTUAL REAL EXAM CORRECT QUESTIONS AND ANSWERS 2024.

Preview 3 out of 20  pages

  • May 18, 2024
  • 20
  • 2023/2024
  • Exam (elaborations)
  • Questions & answers
avatar-seller
WGU D432 – DIGITAL FORENSICS IN
CYBERSECURITY ACTUAL REAL EXAM
CORRECT QUESTIONS AND ANSWERS 2024.

American Standard Code for Information Interchange (ASCII) - ANSWER >>>>A set of
codes defining all the various keystrokes you could make, including letters, numbers,
characters, and even the spacebar and return keys.

Anonymous remailing - ANSWER >>>>The process of sending an email message to an
anonymizer. The anonymizer strips identifying information from an email message
before forwarding it with the anonymous mailing computer's IP address.

Anti-forensics - ANSWER >>>>The actions that perpetrators take to conceal their
locations, activities, or identities.

Asymmetric cryptography - ANSWER >>>>Cryptography wherein two keys are used:
one to encrypt the message and another to decrypt it.

Asynchronous transfer mode (ATM) - ANSWER >>>>A high-speed connection
technology that uses fixed-length, 53-byte packets called calls.

Authenticate - ANSWER >>>>To verify the identity of a person, or to verify evidence.

Base transceiver station (BTS) - ANSWER >>>>The part of the cell network responsible
for communications between the mobile phone and the network switching system.

Basic input/output system (BIOS) - ANSWER >>>>The basic instructions stored on a
chip for booting up the computer.

Bit-level information - ANSWER >>>>Information at the level of actual 1s and 0s stored
in memory or on the storage device.

Block cipher - ANSWER >>>>A form of cryptography that encrypts data in blocks; 64-bit
blocks are quite common, although some algorithms (like AES) use larger blocks.

Bootstrap environment - ANSWER >>>>A special program, such as U-Boot or
RedBoot, that is stored in a special section of the flash memory.

Brute-force attack - ANSWER >>>>An attack in which the attacker tries to decrypt a
message by simply applying every possible key in the keyspace.

,Business continuity plan (BCP) - ANSWER >>>>A plan for maintaining minimal
operations until the business can return to full normal operations.

Business impact analysis (BIA) - ANSWER >>>>An analysis of how specific incidents
might impact the business operations.

Caesar cipher - ANSWER >>>>The method of cryptography in which someone chooses
a number by which to shift each letter of a text in the alphabet and substitute the new
letter for the letter being encrypted. This is also known as a monoalphabet, single-
alphabet, or substitution cipher.

Carrier - ANSWER >>>>The signal, stream, or data file in which the payload is hidden.

Cell-phone forensics - ANSWER >>>>The process of searching the contents of cell
phones.

Chain of custody - ANSWER >>>>The continuity of control of evidence that makes it
possible to account for all that has happened to evidence between its original collection
and its appearance in court, preferably unaltered.

Channel - ANSWER >>>>The type of medium used to hide data in steganography. This
may be photos, video, sound files, or Voice over IP.

Clean room - ANSWER >>>>An environment that has a controlled level of
contamination, such as from dust, microbes, and other particles.

Cloud computing - ANSWER >>>>The practice of delivering hosted services over the
internet. This can be software as a service, platform as a service, or infrastructure as a
service.

Computer forensics - ANSWER >>>>The use of analytical and investigative techniques
to identify, collect, examine, and preserve computer-based material for presentation as
evidence in a court of law.

Consistency checking - ANSWER >>>>A technique for file system repair that involves
scanning a disk's logical structure and ensuring that it is consistent with its specification.

Cryptanalysis - ANSWER >>>>A method of using techniques other than brute force to
derive a cryptographic key.

Curriculum vitae (CV) - ANSWER >>>>An extensive document expounding one's
experience and qualifications for a position, similar to a résumé but with more detail. In
academia and expert work, it is usually used rather than a résumé.

Cyberstalking - ANSWER >>>>The use of electronic communications to harass or
threaten another person.

, Data consistency - ANSWER >>>>The act of ensuring the data that is extracted is
consistent.

Daubert standard - ANSWER >>>>The standard holding that only methods and tools
widely accepted in the scientific community can be used in court.

Demonstrative evidence - ANSWER >>>>Information that helps explain other evidence.
An example is a chart that explains a technical concept to the judge and jury.

Denial-of-service (DoS) attack - ANSWER >>>>An attack designed to overwhelm the
target system so it can no longer reply to legitimate requests for connection.

Digital evidence - ANSWER >>>>Information that has been processed and assembled
so that it is relevant to an investigation and supports a specific finding or determination.

Digital forensics - ANSWER >>>>Computer forensics expanded to include
smartphones, smart watches, and other current and forthcoming digital media and
devices.

Disaster recovery plan (DRP) - ANSWER >>>>A plan for returning the business to full
normal operations.

Disk forensics - ANSWER >>>>The process of acquiring and analyzing information
stored on physical storage media, such as computer hard drives or smartphones.

Disk Operating System (DOS) - ANSWER >>>>A command-line operating system.

Disk striping - ANSWER >>>>Distribution of data across multiple disk sectors to
improve speed (also called RAID 0).

Distributed denial-of-service (DDoS) attack - ANSWER >>>>An attack in which the
attacker seeks to infect several machines, and use those machines to overwhelm the
target system to achieve a denial of service.

Documentary evidence - ANSWER >>>>Data stored in written form, on paper or in
electronic files, such as email messages and telephone call-detail records. Investigators
must authenticate documentary evidence.

Drive geometry - ANSWER >>>>The functional dimensions of a drive in terms of the
number of heads, cylinders, and sectors per track.

Dump - ANSWER >>>>A complete copy of every bit of memory or cache recorded in
permanent storage or printed on paper.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller nawfsidehuncho. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $27.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

72349 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$27.99
  • (0)
  Add to cart