WGU D431 STUDY QUESTIONS WITH 100%
CORRECT ANSWERS!! 2025
American Standard Code for Information Interchange (ASCII) - ✔✔A set of codes defining all
the various keystrokes you could make, including letters, numbers, characters, and even the
spacebar and return keys.
Anonymous remailing - ✔✔The process of sending an email message to an anonymizer. The
anonymizer strips identifying information from an email message before forwarding it with the
anonymous mailing computer's IP address.
Anti-forensics - ✔✔The actions that perpetrators take to conceal their locations, activities, or
identities.
Asymmetric cryptography - ✔✔Cryptography wherein two keys are used: one to encrypt the
message and another to decrypt it.
Asynchronous transfer mode (ATM) - ✔✔A high-speed connection technology that uses
fixed-length, 53-byte packets called calls.
Authenticate - ✔✔To verify the identity of a person, or to verify evidence.
Base transceiver station (BTS) - ✔✔The part of the cell network responsible for
communications between the mobile phone and the network switching system.
Basic input/output system (BIOS) - ✔✔The basic instructions stored on a chip for booting up
the computer.
Bit-level information - ✔✔Information at the level of actual 1s and 0s stored in memory or
on the storage device.
,Block cipher - ✔✔A form of cryptography that encrypts data in blocks; 64-bit blocks are quite
common, although some algorithms (like AES) use larger blocks.
Bootstrap environment - ✔✔A special program, such as U-Boot or RedBoot, that is stored in
a special section of the flash memory.
Brute-force attack - ✔✔An attack in which the attacker tries to decrypt a message by simply
applying every possible key in the keyspace.
Business continuity plan (BCP) - ✔✔A plan for maintaining minimal operations until the
business can return to full normal operations.
Business impact analysis (BIA) - ✔✔An analysis of how specific incidents might impact the
business operations.
Caesar cipher - ✔✔The method of cryptography in which someone chooses a number by
which to shift each letter of a text in the alphabet and substitute the new letter for the letter
being encrypted. This is also known as a Mono alphabet, single-alphabet, or substitution cipher.
Carrier - ✔✔The signal, stream, or data file in which the payload is hidden.
Cell-phone forensics - ✔✔The process of searching the contents of cell phones.
Chain of custody - ✔✔The continuity of control of evidence that makes it possible to account
for all that has happened to evidence between its original collection and its appearance in
court, preferably unaltered.
Channel - ✔✔The type of medium used to hide data in steganography. This may be photos,
video, sound files, or Voice over IP.
, Clean room - ✔✔An environment that has a controlled level of contamination, such as from
dust, microbes, and other particles.
Cloud computing - ✔✔The practice of delivering hosted services over the internet. This can
be software as a service, platform as a service, or infrastructure as a service.
Computer forensics - ✔✔The use of analytical and investigative techniques to identify,
collect, examine, and preserve computer-based material for presentation as evidence in a court
of law.
Consistency checking - ✔✔A technique for file system repair that involves scanning a disk's
logical structure and ensuring that it is consistent with its specification.
Cryptanalysis - ✔✔A method of using techniques other than brute force to derive a
cryptographic key.
Curriculum vitae (CV) - ✔✔An extensive document expounding one's experience and
qualifications for a position, similar to a résumé but with more detail. In academia and expert
work, it is usually used rather than a résumé.
Cyberstalking - ✔✔The use of electronic communications to harass or threaten another
person.
Data consistency - ✔✔The act of ensuring the data that is extracted is consistent.
Daubert standard - ✔✔The standard holding that only methods and tools widely accepted in
the scientific community can be used in court.
CORRECT ANSWERS!! 2025
American Standard Code for Information Interchange (ASCII) - ✔✔A set of codes defining all
the various keystrokes you could make, including letters, numbers, characters, and even the
spacebar and return keys.
Anonymous remailing - ✔✔The process of sending an email message to an anonymizer. The
anonymizer strips identifying information from an email message before forwarding it with the
anonymous mailing computer's IP address.
Anti-forensics - ✔✔The actions that perpetrators take to conceal their locations, activities, or
identities.
Asymmetric cryptography - ✔✔Cryptography wherein two keys are used: one to encrypt the
message and another to decrypt it.
Asynchronous transfer mode (ATM) - ✔✔A high-speed connection technology that uses
fixed-length, 53-byte packets called calls.
Authenticate - ✔✔To verify the identity of a person, or to verify evidence.
Base transceiver station (BTS) - ✔✔The part of the cell network responsible for
communications between the mobile phone and the network switching system.
Basic input/output system (BIOS) - ✔✔The basic instructions stored on a chip for booting up
the computer.
Bit-level information - ✔✔Information at the level of actual 1s and 0s stored in memory or
on the storage device.
,Block cipher - ✔✔A form of cryptography that encrypts data in blocks; 64-bit blocks are quite
common, although some algorithms (like AES) use larger blocks.
Bootstrap environment - ✔✔A special program, such as U-Boot or RedBoot, that is stored in
a special section of the flash memory.
Brute-force attack - ✔✔An attack in which the attacker tries to decrypt a message by simply
applying every possible key in the keyspace.
Business continuity plan (BCP) - ✔✔A plan for maintaining minimal operations until the
business can return to full normal operations.
Business impact analysis (BIA) - ✔✔An analysis of how specific incidents might impact the
business operations.
Caesar cipher - ✔✔The method of cryptography in which someone chooses a number by
which to shift each letter of a text in the alphabet and substitute the new letter for the letter
being encrypted. This is also known as a Mono alphabet, single-alphabet, or substitution cipher.
Carrier - ✔✔The signal, stream, or data file in which the payload is hidden.
Cell-phone forensics - ✔✔The process of searching the contents of cell phones.
Chain of custody - ✔✔The continuity of control of evidence that makes it possible to account
for all that has happened to evidence between its original collection and its appearance in
court, preferably unaltered.
Channel - ✔✔The type of medium used to hide data in steganography. This may be photos,
video, sound files, or Voice over IP.
, Clean room - ✔✔An environment that has a controlled level of contamination, such as from
dust, microbes, and other particles.
Cloud computing - ✔✔The practice of delivering hosted services over the internet. This can
be software as a service, platform as a service, or infrastructure as a service.
Computer forensics - ✔✔The use of analytical and investigative techniques to identify,
collect, examine, and preserve computer-based material for presentation as evidence in a court
of law.
Consistency checking - ✔✔A technique for file system repair that involves scanning a disk's
logical structure and ensuring that it is consistent with its specification.
Cryptanalysis - ✔✔A method of using techniques other than brute force to derive a
cryptographic key.
Curriculum vitae (CV) - ✔✔An extensive document expounding one's experience and
qualifications for a position, similar to a résumé but with more detail. In academia and expert
work, it is usually used rather than a résumé.
Cyberstalking - ✔✔The use of electronic communications to harass or threaten another
person.
Data consistency - ✔✔The act of ensuring the data that is extracted is consistent.
Daubert standard - ✔✔The standard holding that only methods and tools widely accepted in
the scientific community can be used in court.