D431 TEST QUESTIONS WITH 100% CORRECT
ANSWERS!! 2025
Disk forensics
The process of acquiring and analyzing information stored on physical storage media, such as
computer hard drives or smartphones.
Email forensics
The study of the source and content of email as evidence, including the identification of the
sender, recipient, date, time, and origination location of an email message.
Network forensics
The process of collecting and analyzing raw network data and systematically tracking network
traffic to determine how security incidents occur.
Internet forensics
The process of piecing together where and when a user has been on the Internet
Software forensics
analyze software-used to determine cause; either accidental or intentional can be used to
recover lost code
Live system forensics
The process of searching memory in real time, typically for working with compromised hosts or
to identify system abuse.
Cell-phone forensics
The process of searching the contents of cell phones.
Chain of Custody
the documented and unbroken transfer of evidence
, Document Trail
The rule is that you document everything.
Secure the Evidence
where the actual collection of the evidence occurs, properly packaged and labeled so that
evidence is both easily found and easily verified as not being tampered with
Daubert standard
A test of scientific acceptability applicable to the gathering of evidence in criminal cases.
The Federal Privacy Act of 1974
Regulates what personal information the Federal government can collect about private
individuals
The Privacy Protection Act of 1980
protects journalists from being required to turn over to law enforcement any work product and
documentary materials, including sources, before it is disseminated to the public.
The Communications Assistance to Law Enforcement Act of 1994 (CALEA)
1994 is a federal wiretap law for traditional wired telephony. It was expanded in 2004 to
include wireless, voice over packets, and other forms of electronic communications, including
signaling traffic and metadata.
Unlawful Access to Stored Communications: 18 U.S.C. § 2701
This act covers access to a facility through which electronic communication is provided or
exceeding the access that was authorized. It is broadly written to apply to a range of offenses.
Punishment can be up to 5 years in prison and fines for the first offense.
The Electronic Communications Privacy Act of 1986
prohibits the interception of information communicated by electronic means
ANSWERS!! 2025
Disk forensics
The process of acquiring and analyzing information stored on physical storage media, such as
computer hard drives or smartphones.
Email forensics
The study of the source and content of email as evidence, including the identification of the
sender, recipient, date, time, and origination location of an email message.
Network forensics
The process of collecting and analyzing raw network data and systematically tracking network
traffic to determine how security incidents occur.
Internet forensics
The process of piecing together where and when a user has been on the Internet
Software forensics
analyze software-used to determine cause; either accidental or intentional can be used to
recover lost code
Live system forensics
The process of searching memory in real time, typically for working with compromised hosts or
to identify system abuse.
Cell-phone forensics
The process of searching the contents of cell phones.
Chain of Custody
the documented and unbroken transfer of evidence
, Document Trail
The rule is that you document everything.
Secure the Evidence
where the actual collection of the evidence occurs, properly packaged and labeled so that
evidence is both easily found and easily verified as not being tampered with
Daubert standard
A test of scientific acceptability applicable to the gathering of evidence in criminal cases.
The Federal Privacy Act of 1974
Regulates what personal information the Federal government can collect about private
individuals
The Privacy Protection Act of 1980
protects journalists from being required to turn over to law enforcement any work product and
documentary materials, including sources, before it is disseminated to the public.
The Communications Assistance to Law Enforcement Act of 1994 (CALEA)
1994 is a federal wiretap law for traditional wired telephony. It was expanded in 2004 to
include wireless, voice over packets, and other forms of electronic communications, including
signaling traffic and metadata.
Unlawful Access to Stored Communications: 18 U.S.C. § 2701
This act covers access to a facility through which electronic communication is provided or
exceeding the access that was authorized. It is broadly written to apply to a range of offenses.
Punishment can be up to 5 years in prison and fines for the first offense.
The Electronic Communications Privacy Act of 1986
prohibits the interception of information communicated by electronic means