Forensics - M Choic4 Word Scramble
|
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
| Question | Answer |
| Although a disk editor gives you the most flexibility in _______, it might not be capable of examining a __________ file's contents. | testing, compressed |
| FTK and other computer forensics programs use _________ to tag and document digital evidence. | bookmarks |
| Getting a hash value with a ___________ ______ is much faster and easier than with a ________ _________ ____. | hexadecimal editor, computer forensics tool |
| One way to hide partitions is to create a partition on a disk, and then use a disk editor such as _____ ________ to manually delete any reference to it. | Norton DiskEdit |
| The term _____________ comes from the Greek word for “hidden writing.” | steganography |
| _____________ is defined as the art and science of hiding messages in such a way that only the intended recipient knows the message is there. | Steganography |
| Many commercial encryption programs use a technology called ____ ______, which is designed to recover encrypted data if users forget their passphrases or if the user key is corrupted after a system data failure. | key escrow |
| ________ recovery is a fairly easy task in computer forensic analysis. | Password |
| ______ is a remote access program for communication between two computers. The connection is established by using the DiskExplorer program (FAT or NTFS) corresponding to the suspect (remote) computer’s file system. | HDHOST |
Created by:
srentrop