Question
click below
click below
Question
Normal Size Small Size show me how
Forensics - M Choic4
Question | Answer |
---|---|
Although a disk editor gives you the most flexibility in _______, it might not be capable of examining a __________ file's contents. | testing, compressed |
FTK and other computer forensics programs use _________ to tag and document digital evidence. | bookmarks |
Getting a hash value with a ___________ ______ is much faster and easier than with a ________ _________ ____. | hexadecimal editor, computer forensics tool |
One way to hide partitions is to create a partition on a disk, and then use a disk editor such as _____ ________ to manually delete any reference to it. | Norton DiskEdit |
The term _____________ comes from the Greek word for “hidden writing.” | steganography |
_____________ is defined as the art and science of hiding messages in such a way that only the intended recipient knows the message is there. | Steganography |
Many commercial encryption programs use a technology called ____ ______, which is designed to recover encrypted data if users forget their passphrases or if the user key is corrupted after a system data failure. | key escrow |
________ recovery is a fairly easy task in computer forensic analysis. | Password |
______ is a remote access program for communication between two computers. The connection is established by using the DiskExplorer program (FAT or NTFS) corresponding to the suspect (remote) computer’s file system. | HDHOST |