D431
DIGITAL
FORENSICS
IN
CYBERSECURITY
COURSE
WORK
2024
INVESTIGATION,
AND
RESPONSE
_________
describes
the
total
number
of
coprime
numbers;
two
numbers
are
considered
coprime
if
they
have
no
common
factors.
A
Kasiski
examination
B
Euler's
Totient
C
Caesar
cipher
D
Steganalysis
-
ANSB
_________
is
the
method
used
by
password
crackers
who
work
with
pre-calculated
hashes
of
all
passwords
possible
within
a
certain
character
space.
A
Rainbow
table
B
SQL
injection
C
Phishing
D Denial
of
service
(DoS)
attack
-
ANSA
__________
govern
whether,
when,
how,
and
why
proof
of
a
legal
case
can
be
placed
before
a
judge
or
jury.
A
Forensic
specialists
B
Common
practices
C
General
principles
D
Rules
of
evidence
-
ANSD
__________
involves
making
an
message
appear
to
come
from
someone
or
someplace
other
than
the
real
sender
or
location.
A
Spoofing
B
Remailing
C
Anonymous
remailing
D
Transference
-
ANSA
__________
is
a
free
utility
that
comes
as
a
graphical
user
interface
for
use
with
Windows
operating
systems.
When
you
first
launch
the
utility,
it
presents
you
with
a
cluster-by-cluster
view
of
your
hard
drive
in
hexadecimal
form.
A
Disk
Investigator
B
BackTrack
C
AnaDisk
Disk
Analysis
Tool
D
The
Sleuth
Kit
-
ANSA __________
is
a
Linux
Live
CD
that
you
use
to
boot
a
system
and
then
use
the
tools.
It
is
a
free
Linux
distribution,
making
it
extremely
attractive
to
schools
teaching
forensics
or
laboratories
on
a
strict
budget.
A
BackTrack
B
The
Sleuth
Kit
C
Disk
Investigator
D
Helix
-
ANSA
__________
is
a
live-system
forensic
technique
in
which
you
collect
a
memory
dump
and
perform
analysis
in
an
isolated
environment.
A
Volatile
memory
analysis
B
Forensic
investigation
C
Power-on
self
test
D
Master
boot
record
-
ANSA
__________
is
a
storage
controller
device
driver
in
Windows.
A
Ntdetect.com
B
Ntbootdd.sys
C
Lsass.exe
D
Csrss.exe
-
ANSB
__________
is
a
term
that
refers
to
hiding
messages
in
sound
files.
A
Steganophony
B
Steganography
C
Asymmetric
cryptography D
Symmetric
cryptography
-
ANSA
__________
is
a
term
that
refers
to
how
long
data
will
last,
related
to
volatility.
A
Bit-level
information
B
Slack
space
C
Life
span
D
Expert
report
-
ANSC
__________
is
about
obfuscating
the
message
so
that
it
cannot
be
read.
A
Cryptography
B
Steganalysis
C
Steganography
D
Substitution
-
ANSA
__________
is
cryptography
wherein
two
keys
are
used:
one
to
encrypt
the
message
and
another
to
decrypt
it.
A
symmetric
cryptography
B
Euler's
Totient
C
Feistel
cipher
D
asymmetric
cryptography
-
ANSD
__________
is
data
stored
as
written
matter,
on
paper
or
in
electronic
files.
A