D431 STUDY QUESTIONS WITH 100% CORRECT
ANSWERS!! 2025
American Standard Code for Information Interchange (ASCII)
A set of codes defining all the various keystrokes you could make, including letters, numbers,
characters, and even the spacebar and return keys.
Anonymous remailing
The process of sending an email message to an anonymizer. The anonymizer strips identifying
information from an email message before forwarding it with the anonymous mailing
computer's IP address.
Anti-forensics
The actions that perpetrators take to conceal their locations, activities, or identities.
Asymmetric cryptography
Cryptography wherein two keys are used: one to encrypt the message and another to decrypt
it.
Asynchronous transfer mode (ATM)
A high-speed connection technology that uses fixed-length, 53-byte packets called calls.
Authenticate
To verify the identity of a person, or to verify evidence.
Base transceiver station (BTS)
The part of the cell network responsible for communications between the mobile phone and
the network switching system.
Bit-level information
Information at the level of actual 1s and 0s stored in memory or on the storage device.
,Block cipher
A form of cryptography that encrypts data in blocks; 64-bit blocks are quite common, although
some algorithms (like AES) use larger blocks.
Bootstrap environment
A special program, such as U-Boot or RedBoot, that is stored in a special section of the flash
memory.
Brute-force attack
An attack in which the attacker tries to decrypt a message by simply applying every possible key
in the keyspace.
Business continuity plan (BCP)
A plan for maintaining minimal operations until the business can return to full normal
operations.
Business impact analysis (BIA)
An analysis of how specific incidents might impact the business operations.
Caesar cipher
The method of cryptography in which someone chooses a number by which to shift each letter
of a text in the alphabet and substitute the new letter for the letter being encrypted. This is also
known as a monoalphabet, single-alphabet, or substitution cipher.
Carrier
The signal, stream, or data file in which the payload is hidden.
Channel
The type of medium used to hide data in steganography. This may be photos, video, sound files,
or Voice over IP.
, Clean room
An environment that has a controlled level of contamination, such as from dust, microbes, and
other particles.
Consistency checking
A technique for file system repair that involves scanning a disk's logical structure and ensuring
that it is consistent with its specification.
Cryptanalysis
A method of using techniques other than brute force to derive a cryptographic key.
Curriculum vitae (CV)
An extensive document expounding one's experience and qualifications for a position, similar to
a résumé but with more detail. In academia and expert work, it is usually used rather than a
résumé.
Data consistency
The act of ensuring the data that is extracted is consistent.
Daubert standard
The standard holding that only methods and tools widely accepted in the scientific community
can be used in court.
Denial-of-service (DoS) attack
An attack designed to overwhelm the target system so it can no longer reply to legitimate
requests for connection.
Digital evidence
Information that has been processed and assembled so that it is relevant to an investigation
and supports a specific finding or determination.
ANSWERS!! 2025
American Standard Code for Information Interchange (ASCII)
A set of codes defining all the various keystrokes you could make, including letters, numbers,
characters, and even the spacebar and return keys.
Anonymous remailing
The process of sending an email message to an anonymizer. The anonymizer strips identifying
information from an email message before forwarding it with the anonymous mailing
computer's IP address.
Anti-forensics
The actions that perpetrators take to conceal their locations, activities, or identities.
Asymmetric cryptography
Cryptography wherein two keys are used: one to encrypt the message and another to decrypt
it.
Asynchronous transfer mode (ATM)
A high-speed connection technology that uses fixed-length, 53-byte packets called calls.
Authenticate
To verify the identity of a person, or to verify evidence.
Base transceiver station (BTS)
The part of the cell network responsible for communications between the mobile phone and
the network switching system.
Bit-level information
Information at the level of actual 1s and 0s stored in memory or on the storage device.
,Block cipher
A form of cryptography that encrypts data in blocks; 64-bit blocks are quite common, although
some algorithms (like AES) use larger blocks.
Bootstrap environment
A special program, such as U-Boot or RedBoot, that is stored in a special section of the flash
memory.
Brute-force attack
An attack in which the attacker tries to decrypt a message by simply applying every possible key
in the keyspace.
Business continuity plan (BCP)
A plan for maintaining minimal operations until the business can return to full normal
operations.
Business impact analysis (BIA)
An analysis of how specific incidents might impact the business operations.
Caesar cipher
The method of cryptography in which someone chooses a number by which to shift each letter
of a text in the alphabet and substitute the new letter for the letter being encrypted. This is also
known as a monoalphabet, single-alphabet, or substitution cipher.
Carrier
The signal, stream, or data file in which the payload is hidden.
Channel
The type of medium used to hide data in steganography. This may be photos, video, sound files,
or Voice over IP.
, Clean room
An environment that has a controlled level of contamination, such as from dust, microbes, and
other particles.
Consistency checking
A technique for file system repair that involves scanning a disk's logical structure and ensuring
that it is consistent with its specification.
Cryptanalysis
A method of using techniques other than brute force to derive a cryptographic key.
Curriculum vitae (CV)
An extensive document expounding one's experience and qualifications for a position, similar to
a résumé but with more detail. In academia and expert work, it is usually used rather than a
résumé.
Data consistency
The act of ensuring the data that is extracted is consistent.
Daubert standard
The standard holding that only methods and tools widely accepted in the scientific community
can be used in court.
Denial-of-service (DoS) attack
An attack designed to overwhelm the target system so it can no longer reply to legitimate
requests for connection.
Digital evidence
Information that has been processed and assembled so that it is relevant to an investigation
and supports a specific finding or determination.