Legal
Windows
Linux
Network
Wildcard
100

This chronological documentation records the seizure, custody, control, and transfer of evidence

What is the Chain of Custody?

100

These "shortcuts" record the last time a file was opened, even if the file was deleted.

What are LNK files?

100

This "hidden" file in a user's home directory tracks commands entered into the command line.

What is .bash_history?

100

Public Cloud forensics is generally heavily involved with the evaluation of __________.

logs

100

T/F: Even if spoliation occurs in good faith, the trial judge might still suppress (disqualify) the forensic evidence or permit an adverse inference.

True

200

This doctrine allows the seizure of evidence not in a warrant if seen in the open during a lawful search.

What is the Plain View (Sight) Doctrine?

200

Located in System32\config, this Registry hive contains the "LastWrite" times for USB devices.

What is the SYSTEM hive?

200

This /var/log file is the primary source for investigating failed SSH logins and sudo usage.

What is auth.log (or secure)?

200

This file format is the standard for "Full Packet Captures," recording every bit of data.

What is PCAP?

200

In a SSD: Factory Access Mode allows for reading the encryption key directly from the drive _______, enabling a usable bitstream image to be obtained from the device, without changing the original evidence.

firmware

300

The ________ amendment protects against the government being able to force a person to decrypt data. 

5th

300

Within the NTFS Master File Table (MFT), these two specific attributes store timestamp data; one is easily modified by user-level "timestomping" tools, while the other is typically only updated by the OS kernel, creating a discrepancy for investigators.

What are $Standard_Information ($SI) and $File_Name ($FN)?

300

This is the primary command-line tool used by investigators to query and filter the binary logs managed by systemd.

What is journalctl?

300

To reconstruct a captured VoIP call in Wireshark, an investigator must first navigate to the Telephony menu and analyze streams using this specific protocol.

What is RTP (Real-time Transport Protocol)?

300

This technique recovers files by searching for "magic bytes" when the metadata is missing.

What is Data Carving?

400

The ________ decision established that the government must know in advance both that a certain piece of evidence exists and its location before a defendant can be compelled to produce that evidence.

Hoffman

400

This hidden file records every change made to the filesystem metadata, allowing an investigator to see what files were created or deleted even if the MFT entry has been overwritten.

What is the $UsnJrnl (Update Sequence Number Journal)?

400

WildCard

Wildcard

400

This security solution monitors and inspects "data in motion" across the network to prevent sensitive information like SSNs or credit card numbers from being exfiltrated.

What is Network DLP (Data Loss Prevention)?

400

This specific recovery metric defines the maximum age of the files an organization is willing to lose (e.g., "We must be able to recover data from 1 hour ago").

What is RPO (Recovery Point Objective)?

500

This 1993 Supreme Court case set the standard for admitting expert scientific testimony.

Name Case or Standard. 

What is Daubert (v. Merrell Dow Pharmaceuticals)?

500

While this artifact provides the "Run Count" and evidence that an application was actually executed by the CPU, this other artifact is used to prove a user's intent by tracking which specific documents or folders they manually opened.

What are Prefetch and LNK Files?

500

To view logs for a specific background service, such as a malicious script running as a daemon, an investigator would use the -u flag followed by this.

What is the Unit Name?

500

This specific Wazuh module monitors changes to critical system files and can alert an investigator if an attacker modifies a Windows DLL or a Linux binary.

What is FIM (File Integrity Monitoring)?

500

When a user deletes a file in Windows, it is moved here and renamed with a string starting with $R or $I.

What is the Recycle Bin ($Recycle.Bin)?