What is the first step in a forensic investigation?
Identification
What protocol secures wireless communication?
WPA
What feature allows you to recover Windows to its original state?
Reset
Convert to Decimal: 0101
5
What is a measure to protect digital data?
Encryption
What type of evidence is collected during an incident?
Digital
What network devices connects multiple devices on a LAN network?
Switch
What tool is used to manage disk partitions in Windows?
Disk Management
Convert 33 into Binary
00100001
What type of malware disguises itself as legitimate software?
Trojan
What is a key requirement for preserving evidence?
Chain of Custody
What type of network topology connects all devices to a central hub?
Star
What is the main function of the Control Panel?
Settings
Convert to Binary 255
11111111
What is the process of verifying user identity?
Authentication
What is used to analyze digital evidence?
Forensic Tools
What technology uses radio waves for communication?
Wi-Fi
What file system is commonly used by Windows 10?
NTFS
What is the base for binary?
Base 2
What is a common method for tracking cyber threats?
Monitoring
What legal principle governs the admissibility of evidence?
Relevance
What network typology connects devices to a circular loop in which each device is connected to 2 other devices in the loop?
Ring Topology
What command is used to open the Task Manager?
Ctrl+Shift+Esc
What is the base for decimal
Base 10
What is the term for unauthorized access to a system?
Breach