Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

WGU D431 - DIGITAL FORENSICS IN CYBERSECURITY | (DQO1 VOCAB & STUDY GUIDE) | QUESTIONS AND ANSWERS | 2026 UPDATE WITH COMPLETE SOLUTION

Beoordeling
-
Verkocht
1
Pagina's
18
Cijfer
A+
Geüpload op
30-01-2024
Geschreven in
2023/2024

WGU D431 - Digital Forensics in Cybersecurity (DQO1 vocab & study guide) Questions & Answers..

Instelling
WGU D431
Vak
WGU D431

Voorbeeld van de inhoud

WGU D431 - Digital Forensics in
Cybersecurity (DQO1 vocab & study
guide) Questions & Answers..




American Standard Code for Information Interchange (ASCII) Answer- A set of
codes defining all the various keystrokes you could make, including letters, numbers,
characters, and even the spacebar and return keys.

Anonymous remailing Answer- The process of sending an email message to an
anonymizer. The anonymizer strips identifying information from an email message
before forwarding it with the anonymous mailing computer's IP address.

Anti-forensics Answer- The actions that perpetrators take to conceal their locations,
activities, or identities.

Asymmetric cryptography Answer- Cryptography wherein two keys are used: one to
encrypt the message and another to decrypt it.

Asynchronous transfer mode (ATM) Answer- A high-speed connection technology
that uses fixed-length, 53-byte packets called calls.

Authenticate Answer- To verify the identity of a person, or to verify evidence.

Base transceiver station (BTS) Answer- The part of the cell network responsible for
communications between the mobile phone and the network switching system.

Basic input/output system (BIOS) Answer- The basic instructions stored on a chip
for booting up the computer.

Bit-level information Answer- Information at the level of actual 1s and 0s stored in
memory or on the storage device.

Block cipher Answer- A form of cryptography that encrypts data in blocks; 64-bit
blocks are quite common, although some algorithms (like AES) use larger blocks.

Bootstrap environment Answer- A special program, such as U-Boot or RedBoot, that
is stored in a special section of the flash memory.

,Brute-force attack Answer- An attack in which the attacker tries to decrypt a
message by simply applying every possible key in the keyspace.

Business continuity plan (BCP) Answer- A plan for maintaining minimal operations
until the business can return to full normal operations.

Business impact analysis (BIA) Answer- An analysis of how specific incidents might
impact the business operations.

Caesar cipher Answer- The method of cryptography in which someone chooses a
number by which to shift each letter of a text in the alphabet and substitute the new
letter for the letter being encrypted. This is also known as a monoalphabet, single-
alphabet, or substitution cipher.

Carrier Answer- The signal, stream, or data file in which the payload is hidden.

Cell-phone forensics Answer- The process of searching the contents of cell phones.

Chain of custody Answer- The continuity of control of evidence that makes it
possible to account for all that has happened to evidence between its original
collection and its appearance in court, preferably unaltered.

Channel Answer- The type of medium used to hide data in steganography. This may
be photos, video, sound files, or Voice over IP.

Clean room Answer- An environment that has a controlled level of contamination,
such as from dust, microbes, and other particles.

Cloud computing Answer- The practice of delivering hosted services over the
internet. This can be software as a service, platform as a service, or infrastructure as
a service.

Computer forensics Answer- The use of analytical and investigative techniques to
identify, collect, examine, and preserve computer-based material for presentation as
evidence in a court of law.

Consistency checking Answer- A technique for file system repair that involves
scanning a disk's logical structure and ensuring that it is consistent with its
specification.

Cryptanalysis Answer- A method of using techniques other than brute force to
derive a cryptographic key.

Curriculum vitae (CV) Answer- An extensive document expounding one's
experience and qualifications for a position, similar to a résumé but with more detail.
In academia and expert work, it is usually used rather than a résumé.

Cyberstalking Answer- The use of electronic communications to harass or threaten
another person.

, Data consistency Answer- The act of ensuring the data that is extracted is
consistent.

Daubert standard Answer- The standard holding that only methods and tools widely
accepted in the scientific community can be used in court.

Demonstrative evidence Answer- Information that helps explain other evidence. An
example is a chart that explains a technical concept to the judge and jury.

Denial-of-service (DoS) attack Answer- An attack designed to overwhelm the target
system so it can no longer reply to legitimate requests for connection.

Digital evidence Answer- Information that has been processed and assembled so
that it is relevant to an investigation and supports a specific finding or determination.

Digital forensics Answer- Computer forensics expanded to include smartphones,
smart watches, and other current and forthcoming digital media and devices.

Disaster recovery plan (DRP) Answer- A plan for returning the business to full
normal operations.

Disk forensics Answer- The process of acquiring and analyzing information stored
on physical storage media, such as computer hard drives or smartphones.

Disk Operating System (DOS) Answer- A command-line operating system.

Disk striping Answer- Distribution of data across multiple disk sectors to improve
speed (also called RAID 0).

Distributed denial-of-service (DDoS) attack Answer- An attack in which the attacker
seeks to infect several machines, and use those machines to overwhelm the target
system to achieve a denial of service.

Documentary evidence Answer- Data stored in written form, on paper or in
electronic files, such as email messages and telephone call-detail records.
Investigators must authenticate documentary evidence.

Drive geometry Answer- The functional dimensions of a drive in terms of the number
of heads, cylinders, and sectors per track.

Dump Answer- A complete copy of every bit of memory or cache recorded in
permanent storage or printed on paper.

Electronic serial number (ESN) Answer- A unique identification number developed
by the U.S. Federal Communications Commission (FCC) to identify cell phones.

Email forensics Answer- The study of the source and content of email as evidence,
including the identification of the sender, recipient, date, time, and origination
location of an email message.

Geschreven voor

Instelling
WGU D431
Vak
WGU D431

Documentinformatie

Geüpload op
30 januari 2024
Aantal pagina's
18
Geschreven in
2023/2024
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$16.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
EvaTee Phoenix University
Bekijk profiel
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
5184
Lid sinds
4 jaar
Aantal volgers
3566
Documenten
55343
Laatst verkocht
13 uur geleden
TIGHT DEADLINE? I CAN HELP

Many students don\'t have the time to work on their academic papers due to balancing with other responsibilities, for example, part-time work. I can relate. kindly don\'t hesitate to contact me, my study guides, notes and exams or test banks, are 100% graded

3.8

946 beoordelingen

5
451
4
167
3
171
2
48
1
109

Populaire documenten

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen