CHFI
BDDC
Windows 10
Binary
Security
100

What is the first step in a forensic investigation?

Identification

100

What protocol secures wireless communication?

WPA

100

What feature allows you to recover Windows to its original state?

Reset

100

Convert to Decimal: 0101

5

100

What is a measure to protect digital data?

Encryption

200

What type of evidence is collected during an incident?

Digital

200

What network devices connects multiple devices on a LAN network?

Switch

200

What tool is used to manage disk partitions in Windows?

Disk Management

200

Convert 33 into Binary

00100001

200

What type of malware disguises itself as legitimate software?

Trojan

300

What is a key requirement for preserving evidence?

Chain of Custody 

300

What type of network topology connects all devices to a central hub?

Star

300

What is the main function of the Control Panel?

Settings

300

Convert to Binary 255

11111111

300

What is the process of verifying user identity?

Authentication

400

What is used to analyze digital evidence?

Forensic Tools 

400

What technology uses radio waves for communication?

Wi-Fi

400

What file system is commonly used by Windows 10?

NTFS

400

What is the base for binary?

Base 2

400

What is a common method for tracking cyber threats?

Monitoring

500

What legal principle governs the admissibility of evidence?

Relevance 

500

What network typology connects devices to a circular loop in which each device is connected to 2 other devices in the loop?

Ring Topology

500

What command is used to open the Task Manager?

Ctrl+Shift+Esc

500

What is the base for decimal

Base 10

500

What is the term for unauthorized access to a system?

Breach

M
e
n
u