Forensic
Cybersecurity 101
Forensics 102
Forensics 201
Forensics 1001
100

Forensic science is a combination of which two language words?

What is Latin?

100

Word cyber has its origin in which language?

What is Greek?

100

process that tracks the movement of evidence through its collection lifecycle by documenting each person who handled the evidence

what is chain of custody?

100

RAM is _______ data

Volatile

100

There are _____ (number) of root keys 

What is 5?

200

I am related to a discussion or an examination performed in public. Who am I?

What is Forensic?

200

Which of these is not a goal of cybersecurity? Confidentiality? Integrity? Scalability? Availability?

What is Scalability?

200

Two types of digital evidence are ________ and ________?

Persistent and Volatile

200

Hard disk is ____________ data

Persistent

200

____________, SAM, SECURITY, SOFTWARE, SYSTEM are names of hives.

What is Default?

300

Which goal of cybersecurity ensures you only allow access to the right people?

What is Confidentiality?

300

If you and your friends are standing and if bear follows all of you, who do you outrun? everyone? last guy? no one? 

Last guy

300

What is Locard's exchange principle?

Every contact leaves a Trace

300

When Investigations are usually performed as a response to a digital crime, it is ________ ? RDF or PDF?

What is RDF?

300

I am a folder where the keys are backed up?

What is Regback?

400

Which goal of cybersecurity ensures that your data is not tampered with?

What is Integrity?

400

Which goal of cybersecurity ensures you get your data when you need it?

What is Availability?

400

True/False: Full-Disk Forensic Imaging can be expensive and is rarely legally required

True

400

_____ is like a database that stores all kinds of information for proper functioning of the operating system. - Applications - Users - Hardware

What is registry?

400

Directory where Programs are installed in Mac OS is called _________

What is Applications?