Forensic science is a combination of which two language words?
What is Latin?
Word cyber has its origin in which language?
What is Greek?
process that tracks the movement of evidence through its collection lifecycle by documenting each person who handled the evidence
what is chain of custody?
RAM is _______ data
Volatile
There are _____ (number) of root keys
What is 5?
I am related to a discussion or an examination performed in public. Who am I?
What is Forensic?
Which of these is not a goal of cybersecurity? Confidentiality? Integrity? Scalability? Availability?
What is Scalability?
Two types of digital evidence are ________ and ________?
Persistent and Volatile
Hard disk is ____________ data
Persistent
____________, SAM, SECURITY, SOFTWARE, SYSTEM are names of hives.
What is Default?
Which goal of cybersecurity ensures you only allow access to the right people?
What is Confidentiality?
If you and your friends are standing and if bear follows all of you, who do you outrun? everyone? last guy? no one?
Last guy
What is Locard's exchange principle?
Every contact leaves a Trace
When Investigations are usually performed as a response to a digital crime, it is ________ ? RDF or PDF?
What is RDF?
I am a folder where the keys are backed up?
What is Regback?
Which goal of cybersecurity ensures that your data is not tampered with?
What is Integrity?
Which goal of cybersecurity ensures you get your data when you need it?
What is Availability?
True/False: Full-Disk Forensic Imaging can be expensive and is rarely legally required
True
_____ is like a database that stores all kinds of information for proper functioning of the operating system. - Applications - Users - Hardware
What is registry?
Directory where Programs are installed in Mac OS is called _________
What is Applications?