click below
click below
Normal Size Small Size show me how
Forensics - M Choic4
| Question | Answer |
|---|---|
| Although a disk editor gives you the most flexibility in _______, it might not be capable of examining a __________ file's contents. | testing, compressed |
| FTK and other computer forensics programs use _________ to tag and document digital evidence. | bookmarks |
| Getting a hash value with a ___________ ______ is much faster and easier than with a ________ _________ ____. | hexadecimal editor, computer forensics tool |
| One way to hide partitions is to create a partition on a disk, and then use a disk editor such as _____ ________ to manually delete any reference to it. | Norton DiskEdit |
| The term _____________ comes from the Greek word for “hidden writing.” | steganography |
| _____________ is defined as the art and science of hiding messages in such a way that only the intended recipient knows the message is there. | Steganography |
| Many commercial encryption programs use a technology called ____ ______, which is designed to recover encrypted data if users forget their passphrases or if the user key is corrupted after a system data failure. | key escrow |
| ________ recovery is a fairly easy task in computer forensic analysis. | Password |
| ______ is a remote access program for communication between two computers. The connection is established by using the DiskExplorer program (FAT or NTFS) corresponding to the suspect (remote) computer’s file system. | HDHOST |