1
WESTERN GOVERNOR’S UNIVERSITY
WGU D431 Digital Forensics
in Cybersecurity
Objective Assessments
Pre-Assessments
Final Exam
(ACTUAL EXAM)
(Latest 2025/ 2026 Updates
Complete Solution Package
, 2
WGU D431 - Digital Forensics in
Cybersecurity
American Standard Code for Information Interchange (ASCII)
A set of codes defining all the various keystrokes you could make, including letters,
numbers, characters, and even the spacebar and return keys.
Anonymous remailing
The process of sending an email message to an anonymizer. The anonymizer strips
identifying information from an email message before forwarding it with the
anonymous mailing computer's IP address.
Anti-forensics
The actions that perpetrators take to conceal their locations, activities, or identities.
Asymmetric cryptography
Cryptography wherein two keys are used: one to encrypt the message and another to
decrypt it.
, 3
Asynchronous transfer mode (ATM)
A high-speed connection technology that uses fixed-length, 53-byte packets called
calls.
Authenticate
To verify the identity of a person, or to verify evidence.
Base transceiver station (BTS)
The part of the cell network responsible for communications between the mobile
phone and the network switching system.
Basic input/output system (BIOS)
The basic instructions stored on a chip for booting up the computer.
Bit-level information
Information at the level of actual 1s and 0s stored in memory or on the storage
device.
, 4
Block cipher
A form of cryptography that encrypts data in blocks; 64-bit blocks are quite
common, although some algorithms (like AES) use larger blocks.
Bootstrap environment
A special program, such as U-Boot or RedBoot, that is stored in a special section of
the flash memory.
Brute-force attack
An attack in which the attacker tries to decrypt a message by simply applying every
possible key in the keyspace.
Business continuity plan (BCP)
A plan for maintaining minimal operations until the business can return to full
normal operations.
Business impact analysis (BIA)
An analysis of how specific incidents might impact the business operations.
WESTERN GOVERNOR’S UNIVERSITY
WGU D431 Digital Forensics
in Cybersecurity
Objective Assessments
Pre-Assessments
Final Exam
(ACTUAL EXAM)
(Latest 2025/ 2026 Updates
Complete Solution Package
, 2
WGU D431 - Digital Forensics in
Cybersecurity
American Standard Code for Information Interchange (ASCII)
A set of codes defining all the various keystrokes you could make, including letters,
numbers, characters, and even the spacebar and return keys.
Anonymous remailing
The process of sending an email message to an anonymizer. The anonymizer strips
identifying information from an email message before forwarding it with the
anonymous mailing computer's IP address.
Anti-forensics
The actions that perpetrators take to conceal their locations, activities, or identities.
Asymmetric cryptography
Cryptography wherein two keys are used: one to encrypt the message and another to
decrypt it.
, 3
Asynchronous transfer mode (ATM)
A high-speed connection technology that uses fixed-length, 53-byte packets called
calls.
Authenticate
To verify the identity of a person, or to verify evidence.
Base transceiver station (BTS)
The part of the cell network responsible for communications between the mobile
phone and the network switching system.
Basic input/output system (BIOS)
The basic instructions stored on a chip for booting up the computer.
Bit-level information
Information at the level of actual 1s and 0s stored in memory or on the storage
device.
, 4
Block cipher
A form of cryptography that encrypts data in blocks; 64-bit blocks are quite
common, although some algorithms (like AES) use larger blocks.
Bootstrap environment
A special program, such as U-Boot or RedBoot, that is stored in a special section of
the flash memory.
Brute-force attack
An attack in which the attacker tries to decrypt a message by simply applying every
possible key in the keyspace.
Business continuity plan (BCP)
A plan for maintaining minimal operations until the business can return to full
normal operations.
Business impact analysis (BIA)
An analysis of how specific incidents might impact the business operations.