Deck 9: Computer Forensics Analysis and Validation

ملء الشاشة (f)
exit full mode
سؤال
​Select the tool below that does not use dictionary attacks or brute force attacks to crack passwords:

A)​Last Bit
B)​AccessData PRTK
C)OSForensics
D)Passware
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The advantage of recording hash values is that you can determine whether data has changed.​
سؤال
One of the most critical aspects of digital forensics is validating digital evidence because ensuring the integrity of data you collect is essential for presenting evidence in court.​
سؤال
Which password recovery method uses every possible letter, number, and character found on a keyboard?​

A)​rainbow table
B)​dictionary attack
C)hybrid attack
D)brute-force attack
سؤال
​In order to aid a forensics investigation, a hardware or software ______________ can be utilized to capture keystrokes remotely.

A)​keygrabber
B)​keylogger
C)packet capture
D)protocol analyzer
سؤال
Advanced hexadecimal editors offer many features not available in digital forensics tools, such as hashing specific files or sectors. ​
سؤال
In private sector cases, like criminal and civil cases, the scope is always defined by a search warrant.​
سؤال
Which option below is not a disk management tool?​

A)Partition Magic​
B)​Partition Master
C)GRUB
D)HexEdit
سؤال
Typically, anti-virus tools run hashes on potential malware files, but some advanced malware uses ________________ as a way to hide its malicious code from antivirus tools.​

A)​hashing
B)​bit-shifting
C)registry edits
D)slack space
سؤال
​In Windows, the ______________ command can be used to both hide and reveal partitions within Explorer.

A)​format
B)​fdisk
C)grub
D)diskpart
سؤال
The _______________________ maintains a national database of updated file hash values for a variety of OSs, applications, and images, but does not list hash values of known illegal files.​

A)​Open Hash Database
B)​HashKeeper Online
C)National Hashed Software Reference
D) National Software Reference Library
سؤال
​Within Windows Vista and later, partition gaps are _____________ bytes in length.

A)​64
B)​128
C)256
D)512
سؤال
A ____________ image file containing software is intended to be bit-stream copied to floppy disks or other external media.​

A)​fdisk
B)​format
C)dd
D)DiskEdit
سؤال
What letter should be typed into DiskEdit in order to mark a good sector as bad?​

A)​M
B)​B
C)T
D)D
سؤال
A user with programming experience may use an assembler program (also called a __________ ) on a file to scramble bits, in order to secure the information contained inside.​

A)​compiler
B)shifter
C)macro
D)script
سؤال
When performing a static acquisition, what should be done after the hardware on a suspect's computer has been inventoried and documented?​

A)​Inventory and documentation information should be stored on a drive and then the drive should be reformatted.
B)​Start the suspect's computer and begin collecting evidence.
C) The hard drive should be removed, if practical, and the system's date and time values should be recorded from the system's CMOS.​
D)Connect the suspect's computer to the local network so that up to date forensics utilities can be utilized.
سؤال
Many commercial encryption programs use a technology called _____________, which is designed to recover encrypted data if users forget their passphrases or if the user key is corrupted after a system failure.​

A)​key vault
B)​key escrow
C)bump key
D)master key
سؤال
Because attorneys do not have the right of full discovery of digital evidence, it is not possible for new evidence to come to light while complying with a defense request for full discovery.​
سؤال
What technique is designed to reduce or eliminate the possibility of a rainbow table being used to discover passwords?​

A)salted passwords
B)​scrambled passwords
C)indexed passwords
D) master passwords
سؤال
The term for detecting and analyzing steganography files is _________________.​

A)​carving
B)​steganology
C)steganalysis
D)steganomics
سؤال
Match the following terms with the correct definitions below:?

-?A technology designed to recover encrypted data if users forget their passphrases or if the user key is corrupted after a system failure.

A)?bit-shifting
B)block-wise hashing?
C)?cover-media
D)key-escrow?
E)?Known File Filter (KFF)
F)rainbow table?
G)?salting passwords
H)scope creep?
I)?steganography
J)stego-media
سؤال
The AccessData program has a hashing database, ________________, which is available only with FTK, and can be used to filter known program files from view and contains the hash values of known illegal files.​

A)​DeepScan Filter
B)Unknown File Filter (UFF)
C)Known File Filter (KFF)
D)FTK Hash Imager
سؤال
In ________ investigations, evidence​ collection tends to be fairly easy and straightforward because investigators usually have ready access to the necessary records and files.
سؤال
Match the following terms with the correct definitions below:?

-?The pnrocess of shifting one or more digits in a binary number to the left or right to produce a different value.

A)?bit-shifting
B)block-wise hashing?
C)?cover-media
D)key-escrow?
E)?Known File Filter (KFF)
F)rainbow table?
G)?salting passwords
H)scope creep?
I)?steganography
J)stego-media
سؤال
Match the following terms with the correct definitions below:?

-?The result of an investigation expanding beyond its original description because the discovery of unexpected evidence increases the amount of work required.

A)?bit-shifting
B)block-wise hashing?
C)?cover-media
D)key-escrow?
E)?Known File Filter (KFF)
F)rainbow table?
G)?salting passwords
H)scope creep?
I)?steganography
J)stego-media
سؤال
In addition to steganography, _____________________ was developed as a way to protect file ownership.​
سؤال
Match the following terms with the correct definitions below:?

-?In steganalysis, the original file with no hidden message.

A)?bit-shifting
B)block-wise hashing?
C)?cover-media
D)key-escrow?
E)?Known File Filter (KFF)
F)rainbow table?
G)?salting passwords
H)scope creep?
I)?steganography
J)stego-media
سؤال
​Examining and analyzing digital evidence depend on the nature of the investigation and the amount of data to process. Criminal investigations are limited to finding data defined in the search warrant, and _____ investigations are often limited by court orders for discovery.
سؤال
What format below is used for VMware images?

A)?.vhd
B)?.vmdk
C).s01
D).aff
سؤال
Match the following terms with the correct definitions below:?

-?In steganalysis, the file containing the hidden message.

A)?bit-shifting
B)block-wise hashing?
C)?cover-media
D)key-escrow?
E)?Known File Filter (KFF)
F)rainbow table?
G)?salting passwords
H)scope creep?
I)?steganography
J)stego-media
سؤال
Match the following terms with the correct definitions below:?

-?A cryptographic technique for embedding information in another file for the purpose of hiding the information from casual observers.

A)?bit-shifting
B)block-wise hashing?
C)?cover-media
D)key-escrow?
E)?Known File Filter (KFF)
F)rainbow table?
G)?salting passwords
H)scope creep?
I)?steganography
J)stego-media
سؤال
Match the following terms with the correct definitions below:?

-?The process of hashing all sectors of a file and then comparing them with sectors on a suspect's disk drive to determine whether there are any remnants of the original file that couldn't be recovered.

A)?bit-shifting
B)block-wise hashing?
C)?cover-media
D)key-escrow?
E)?Known File Filter (KFF)
F)rainbow table?
G)?salting passwords
H)scope creep?
I)?steganography
J)stego-media
سؤال
Which of the following file systems can't be analyzed by OSForensics?

A)​FAT12
B)Ext2fs
C)HFS+
D)XFS
سؤال
In ProDiscover and other digital forensics tools, raw format image files (.dd extension) don't contain ________, so you must validate them manually to ensure the integrity of data.​
سؤال
Match the following terms with the correct definitions below:?

-?Adding bits to a password before it's hashed so that a rainbow table can't find a matching hash value to decifer the password.

A)?bit-shifting
B)block-wise hashing?
C)?cover-media
D)key-escrow?
E)?Known File Filter (KFF)
F)rainbow table?
G)?salting passwords
H)scope creep?
I)?steganography
J)stego-media
سؤال
The term ​_____________ comes from the Greek word for "hidden writing".
سؤال
​In which file system can you hide data by placing sensitive or incriminating data in free or slack space on disk partition clusters?

A)​NTFS
B)​FAT
C)HFSX
D)Ext3fs
سؤال
The goal of recovering as much information as possible can result in ________________, in which an investigation expands beyond the original description because of unexpected evidence found.​

A)​litigation
B)​scope creep
C)criminal charges
D)violations
سؤال
Match the following terms with the correct definitions below:?

-?A file containing the hash value for every possible password that can be generated from a computer's keyboard.

A)?bit-shifting
B)block-wise hashing?
C)?cover-media
D)key-escrow?
E)?Known File Filter (KFF)
F)rainbow table?
G)?salting passwords
H)scope creep?
I)?steganography
J)stego-media
سؤال
Match the following terms with the correct definitions below:?

-?An AccessData database containing the hash values of known legitimate and suspicious files. It's used to identify files for evidence or eliminate them from the investigation if they are legitimate files.

A)?bit-shifting
B)block-wise hashing?
C)?cover-media
D)key-escrow?
E)?Known File Filter (KFF)
F)rainbow table?
G)?salting passwords
H)scope creep?
I)?steganography
J)stego-media
سؤال
Describe the process of block-wise hashing.​
سؤال
For most forensics investigations, you follow the same general procedure. Summarize the steps in the procedure.
سؤال
​List and explain the five steganalysis methods described by Neil F. Johnson and Sushil Jajodia.
سؤال
Describe what happens if a FAT partition containing bad cluster​ is converted to an NTFS partition, and how you miss evidence that's being hidden.
سؤال

Explain what data hiding is and list techniques used to hide data.
سؤال
Explain how bit-shifting, and related techniques, are used to hide data.​
سؤال
Describe some of the forensic processes involved in investigating an employee suspected of industrial espionage.
سؤال
Explain what a digital watermark is and how it's used with data.
سؤال
Why is it important to validate forensic data, and why are advanced hexadecimal editors necessary for this process?
سؤال
Illustrate how an investigator would detect whether a suspect's drive contains hidden partitions.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 9: Computer Forensics Analysis and Validation
1
​Select the tool below that does not use dictionary attacks or brute force attacks to crack passwords:

A)​Last Bit
B)​AccessData PRTK
C)OSForensics
D)Passware
C
2
The advantage of recording hash values is that you can determine whether data has changed.​
True
3
One of the most critical aspects of digital forensics is validating digital evidence because ensuring the integrity of data you collect is essential for presenting evidence in court.​
True
4
Which password recovery method uses every possible letter, number, and character found on a keyboard?​

A)​rainbow table
B)​dictionary attack
C)hybrid attack
D)brute-force attack
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
​In order to aid a forensics investigation, a hardware or software ______________ can be utilized to capture keystrokes remotely.

A)​keygrabber
B)​keylogger
C)packet capture
D)protocol analyzer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
Advanced hexadecimal editors offer many features not available in digital forensics tools, such as hashing specific files or sectors. ​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
In private sector cases, like criminal and civil cases, the scope is always defined by a search warrant.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which option below is not a disk management tool?​

A)Partition Magic​
B)​Partition Master
C)GRUB
D)HexEdit
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
Typically, anti-virus tools run hashes on potential malware files, but some advanced malware uses ________________ as a way to hide its malicious code from antivirus tools.​

A)​hashing
B)​bit-shifting
C)registry edits
D)slack space
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
​In Windows, the ______________ command can be used to both hide and reveal partitions within Explorer.

A)​format
B)​fdisk
C)grub
D)diskpart
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
The _______________________ maintains a national database of updated file hash values for a variety of OSs, applications, and images, but does not list hash values of known illegal files.​

A)​Open Hash Database
B)​HashKeeper Online
C)National Hashed Software Reference
D) National Software Reference Library
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
​Within Windows Vista and later, partition gaps are _____________ bytes in length.

A)​64
B)​128
C)256
D)512
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
A ____________ image file containing software is intended to be bit-stream copied to floppy disks or other external media.​

A)​fdisk
B)​format
C)dd
D)DiskEdit
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
What letter should be typed into DiskEdit in order to mark a good sector as bad?​

A)​M
B)​B
C)T
D)D
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
A user with programming experience may use an assembler program (also called a __________ ) on a file to scramble bits, in order to secure the information contained inside.​

A)​compiler
B)shifter
C)macro
D)script
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
When performing a static acquisition, what should be done after the hardware on a suspect's computer has been inventoried and documented?​

A)​Inventory and documentation information should be stored on a drive and then the drive should be reformatted.
B)​Start the suspect's computer and begin collecting evidence.
C) The hard drive should be removed, if practical, and the system's date and time values should be recorded from the system's CMOS.​
D)Connect the suspect's computer to the local network so that up to date forensics utilities can be utilized.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
Many commercial encryption programs use a technology called _____________, which is designed to recover encrypted data if users forget their passphrases or if the user key is corrupted after a system failure.​

A)​key vault
B)​key escrow
C)bump key
D)master key
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
Because attorneys do not have the right of full discovery of digital evidence, it is not possible for new evidence to come to light while complying with a defense request for full discovery.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
What technique is designed to reduce or eliminate the possibility of a rainbow table being used to discover passwords?​

A)salted passwords
B)​scrambled passwords
C)indexed passwords
D) master passwords
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
The term for detecting and analyzing steganography files is _________________.​

A)​carving
B)​steganology
C)steganalysis
D)steganomics
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
Match the following terms with the correct definitions below:?

-?A technology designed to recover encrypted data if users forget their passphrases or if the user key is corrupted after a system failure.

A)?bit-shifting
B)block-wise hashing?
C)?cover-media
D)key-escrow?
E)?Known File Filter (KFF)
F)rainbow table?
G)?salting passwords
H)scope creep?
I)?steganography
J)stego-media
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
The AccessData program has a hashing database, ________________, which is available only with FTK, and can be used to filter known program files from view and contains the hash values of known illegal files.​

A)​DeepScan Filter
B)Unknown File Filter (UFF)
C)Known File Filter (KFF)
D)FTK Hash Imager
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
In ________ investigations, evidence​ collection tends to be fairly easy and straightforward because investigators usually have ready access to the necessary records and files.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
Match the following terms with the correct definitions below:?

-?The pnrocess of shifting one or more digits in a binary number to the left or right to produce a different value.

A)?bit-shifting
B)block-wise hashing?
C)?cover-media
D)key-escrow?
E)?Known File Filter (KFF)
F)rainbow table?
G)?salting passwords
H)scope creep?
I)?steganography
J)stego-media
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
Match the following terms with the correct definitions below:?

-?The result of an investigation expanding beyond its original description because the discovery of unexpected evidence increases the amount of work required.

A)?bit-shifting
B)block-wise hashing?
C)?cover-media
D)key-escrow?
E)?Known File Filter (KFF)
F)rainbow table?
G)?salting passwords
H)scope creep?
I)?steganography
J)stego-media
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
In addition to steganography, _____________________ was developed as a way to protect file ownership.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
Match the following terms with the correct definitions below:?

-?In steganalysis, the original file with no hidden message.

A)?bit-shifting
B)block-wise hashing?
C)?cover-media
D)key-escrow?
E)?Known File Filter (KFF)
F)rainbow table?
G)?salting passwords
H)scope creep?
I)?steganography
J)stego-media
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
​Examining and analyzing digital evidence depend on the nature of the investigation and the amount of data to process. Criminal investigations are limited to finding data defined in the search warrant, and _____ investigations are often limited by court orders for discovery.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
What format below is used for VMware images?

A)?.vhd
B)?.vmdk
C).s01
D).aff
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
Match the following terms with the correct definitions below:?

-?In steganalysis, the file containing the hidden message.

A)?bit-shifting
B)block-wise hashing?
C)?cover-media
D)key-escrow?
E)?Known File Filter (KFF)
F)rainbow table?
G)?salting passwords
H)scope creep?
I)?steganography
J)stego-media
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
Match the following terms with the correct definitions below:?

-?A cryptographic technique for embedding information in another file for the purpose of hiding the information from casual observers.

A)?bit-shifting
B)block-wise hashing?
C)?cover-media
D)key-escrow?
E)?Known File Filter (KFF)
F)rainbow table?
G)?salting passwords
H)scope creep?
I)?steganography
J)stego-media
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
Match the following terms with the correct definitions below:?

-?The process of hashing all sectors of a file and then comparing them with sectors on a suspect's disk drive to determine whether there are any remnants of the original file that couldn't be recovered.

A)?bit-shifting
B)block-wise hashing?
C)?cover-media
D)key-escrow?
E)?Known File Filter (KFF)
F)rainbow table?
G)?salting passwords
H)scope creep?
I)?steganography
J)stego-media
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
Which of the following file systems can't be analyzed by OSForensics?

A)​FAT12
B)Ext2fs
C)HFS+
D)XFS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
In ProDiscover and other digital forensics tools, raw format image files (.dd extension) don't contain ________, so you must validate them manually to ensure the integrity of data.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
Match the following terms with the correct definitions below:?

-?Adding bits to a password before it's hashed so that a rainbow table can't find a matching hash value to decifer the password.

A)?bit-shifting
B)block-wise hashing?
C)?cover-media
D)key-escrow?
E)?Known File Filter (KFF)
F)rainbow table?
G)?salting passwords
H)scope creep?
I)?steganography
J)stego-media
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
The term ​_____________ comes from the Greek word for "hidden writing".
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
​In which file system can you hide data by placing sensitive or incriminating data in free or slack space on disk partition clusters?

A)​NTFS
B)​FAT
C)HFSX
D)Ext3fs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
The goal of recovering as much information as possible can result in ________________, in which an investigation expands beyond the original description because of unexpected evidence found.​

A)​litigation
B)​scope creep
C)criminal charges
D)violations
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
Match the following terms with the correct definitions below:?

-?A file containing the hash value for every possible password that can be generated from a computer's keyboard.

A)?bit-shifting
B)block-wise hashing?
C)?cover-media
D)key-escrow?
E)?Known File Filter (KFF)
F)rainbow table?
G)?salting passwords
H)scope creep?
I)?steganography
J)stego-media
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
Match the following terms with the correct definitions below:?

-?An AccessData database containing the hash values of known legitimate and suspicious files. It's used to identify files for evidence or eliminate them from the investigation if they are legitimate files.

A)?bit-shifting
B)block-wise hashing?
C)?cover-media
D)key-escrow?
E)?Known File Filter (KFF)
F)rainbow table?
G)?salting passwords
H)scope creep?
I)?steganography
J)stego-media
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
Describe the process of block-wise hashing.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
For most forensics investigations, you follow the same general procedure. Summarize the steps in the procedure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
​List and explain the five steganalysis methods described by Neil F. Johnson and Sushil Jajodia.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
Describe what happens if a FAT partition containing bad cluster​ is converted to an NTFS partition, and how you miss evidence that's being hidden.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45

Explain what data hiding is and list techniques used to hide data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
Explain how bit-shifting, and related techniques, are used to hide data.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
Describe some of the forensic processes involved in investigating an employee suspected of industrial espionage.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
Explain what a digital watermark is and how it's used with data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
Why is it important to validate forensic data, and why are advanced hexadecimal editors necessary for this process?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
Illustrate how an investigator would detect whether a suspect's drive contains hidden partitions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.