_____ refers to malicious software designed to damage, disrupt, or gain unauthorized access to computer systems.
What is malware?
This term refers to a digital "fingerprint" that helps track and identify digital activities.
What is a digital footprint?
This type of consulting focuses on improving a company's operational efficiency and effectiveness.
What is management consulting?
What consulting company has a yellow logo?
What is EY?
In "A Christmas Carol," what is Scrooge's first name?
Who is Ebenezer?
This method involves attempting to gain unauthorized access to a system by mimicking a trustworthy entity.
What is phishing?
The first step in any digital forensic investigation is often to secure and collect this.
What is evidence?
This acronym stands for a popular strategic analysis tool used in consulting.
What is SWOT analysis? (strengths, weaknesses, opportunities, threats)
What consulting company has "water" in their name?
What is PricewaterhouseCoopers (PwC)?
The other reindeer would not let Rudolph join in any of these activities.
What are reindeer games?
The process of converting data into a code to prevent unauthorized access.
Hidden data embedded within files - or data about data.
What is metadata?
This consulting tool helps businesses understand and improve their relationships with customers.
What is customer relationship management (CRM)?
Which company is known for antivirus and cybersecurity solutions and has a name that ends with "e"?
What is McAfee?
In the movie Elf, what does Buddy put on his spaghetti?
What is maple syrup, chocolate syrup, mini marshmallows, M&Ms, chocolate fudge pop-tarts, and caramel syrup?
What is NIST?
What is a cyber security framework developed by the National Institute of Standards & Technology?
Volatile data stored on a computer motherboard - DDR5 is a type.
What is RAM?
What companies are in the Big 4?
What is Deloitte, EY, KPMG, and PwC?
What is the largest consulting firm, by revenue, known for its audit, risk advisory, and consulting services?
What is Deloitte?
This character is a little girl who helps the Grinch discover the true meaning of Christmas.
Who is Cindy Lou Who?
A form of malware that disguises itself as legitimate software but can take control of your computer.
What is Trojan Horse?
What does BIOS stand for?
What is Basic Input Output System?
What is the top publicly traded consulting firm?
What is Accenture?
Which company's forensic tools are often used to recover data from smartphones and tablets?
What is Cellebrite?
In Home Alone (1990), what is the name of the burglars who try to rob the McCallister's home?
Who are the Wet Bandits?