UPDATED VERSION|2025/2026
Memory cell - ANS ✓The fundamental building block of memory.
Metadata - ANS ✓Data about the data, including information about when a
file or directory was created, when it was last modified, and so forth.
Mobile switching centre (MSC) - ANS ✓A switching system for a cellular
network.
Moore's law - ANS ✓The observation by Gordon Moore of Intel
Corporation that capacity would double and price would be cut in half
roughly every 18 to 24 months for products based on computer chips and
related technology.
Multiple-input multiple-output (MIMO) - ANS ✓The wireless technology
that uses multiple antennas to coherently resolve more information than is
possible using a single antenna.
Network forensics - ANS ✓The process of examining network traffic,
including transaction logs and real-time monitoring.
Packets - ANS ✓Chunks of data sent across a network.
Page - ANS ✓A data structure that maps virtual addresses to physical
addresses.
,Payload - ANS ✓The data to be covertly communicated. In other words, it
is the message you want to hide.
Permanent denial of service (PDoS) - ANS ✓an attack that damages the
system so badly the machine needs a full reinstall of its OS and potentially
even new hardware.
Personal identification number (PIN) - ANS ✓An ID number for a cell
phone user.
Personal unlocking code (PUK) - ANS ✓A number for unlocking a cell
phone.
Physical analysis - ANS ✓Offline analysis conducted on an evidence disk
or forensic duplicate after booting from a CD or another system.
Physical damage - ANS ✓Damage to actual hard drive parts; for example,
a damaged platter or spindle.
Physical imaging - ANS ✓Making a physical copy of a disk.
Post Office Protocol version 3 (POP3) - ANS ✓A protocol used to receive
email that works on port 110.
Power-on self-test (POST) - ANS ✓A brief hardware test the BIOS
performs upon boot-up.
,Probative value - ANS ✓The value of evidence in helping determine the
facts in a case.
Protected computer - ANS ✓Any computer at a financial institution of any
kind or a government agency.
Rainbow table - ANS ✓Type of password crackers that work with
precalculated hashes off all passwords available within a certain character
space.
Real evidence - ANS ✓Physical objects that can be touched, held, or
directly observed, such as a laptop with a suspect's fingerprints on it or a
handwritten note.
Recover time objective (RTO) - ANS ✓The time that the system is
expected to be back up. This must be less than MTD.
Recovery point objective (RPO) - ANS ✓The amount of work that might
need to be redone, or data lost.
Routing table - ANS ✓A table used with routers to track what IP addresses
are connected to ports on the router.
Rules of evidence - ANS ✓Rules that govern whether, when, how, and why
proof of a legal case can be placed before a judge or jury.
Scrubber - ANS ✓Software that cleans unallocated space. Also called a
sweeper.
, Simple Mail Transfer Protocol (SMTP) - ANS ✓A protocol used to send
email that works on port 25.
Slack space - ANS ✓The unused space between the logical end of file and
the physical end of file. It is also called file slack.
Slurred image - ANS ✓The result of acquiring a file as it is being updated.
Sniffer - ANS ✓Computer software or hardware that can intercept and log
traffic passing over a digital network.
Social engineering - ANS ✓Nontechnical means of obtaining information
you would not normally have access to.
Software forensics - ANS ✓The process of examining malicious computer
code.
Spoofing - ANS ✓The act of making an email message appear to come from
someone or someplace other than the real sender or location.
Stack (S) - ANS ✓Memory is allocated based on the last-in, first-out (LIFO)
principle.
Steganalysis - ANS ✓The determination of whether a file or
communication hides other information.
Steganography - ANS ✓The art and science of writing hidden messages.