Deck 10: Recovering Graphics Files
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
Play
Full screen (f)
Deck 10: Recovering Graphics Files
1
With many computer forensics tools, you can open files with external viewers.
True
2
Recovering pieces of a file is called ____.
A) carving
B) slacking
C) saving
D) rebuilding
A) carving
B) slacking
C) saving
D) rebuilding
A
3
The majority of digital cameras use the ____ format to store digital pictures.
A) EXIF
B) TIFF
C) PNG
D) GIF
A) EXIF
B) TIFF
C) PNG
D) GIF
A
4
Steganography cannot be used with file formats other than image files.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
A(n) ____ file has a hexadecimal header value of FF D8 FF E0 00 10.
A) EPS
B) BMP
C) GIF
D) JPEG
A) EPS
B) BMP
C) GIF
D) JPEG
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
The image format XIF is derived from the more common ____ file format.
A) GIF
B) JPEG
C) BMP
D) TIFF
A) GIF
B) JPEG
C) BMP
D) TIFF
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
If you can't open an image file in an image viewer, the next step is to examine the file's ____.
A) extension
B) name
C) header data
D) size
A) extension
B) name
C) header data
D) size
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
____ is the art of hiding information inside image files.
A) Steganography
B) Steganalysis
C) Graphie
D) Steganos
A) Steganography
B) Steganalysis
C) Graphie
D) Steganos
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
____ compression compresses data by permanently discarding bits of information in the file.
A) Redundant
B) Lossy
C) Huffman
D) Lossless
A) Redundant
B) Lossy
C) Huffman
D) Lossless
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
The process of converting raw picture data to another format is referred to as ____.
A) JEIDA
B) rastering
C) demosaicing
D) rendering
A) JEIDA
B) rastering
C) demosaicing
D) rendering
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
You use ____ to create, modify, and save bitmap, vector, and metafile graphics files.
A) graphics viewers
B) image readers
C) image viewers
D) graphics editors
A) graphics viewers
B) image readers
C) image viewers
D) graphics editors
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
The simplest way to access a file header is to use a(n) ____ editor
A) hexadecimal
B) image
C) disk
D) text
A) hexadecimal
B) image
C) disk
D) text
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
The uppercase letter ____ has a hexadecimal value of 41.
A) "A"
B) "C"
C) "G"
D) "Z"
A) "A"
B) "C"
C) "G"
D) "Z"
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
The ____ header starts with hexadecimal 49 49 2A and has an offset of four bytes of 5C01 0000 2065 5874 656E 6465 6420 03.
A) TIFF
B) XIF
C) JPEG
D) GIF
A) TIFF
B) XIF
C) JPEG
D) GIF
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
If a graphics file is fragmented across areas on a disk, first you must recover all the fragments to re-create the file.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
____ are based on mathematical instructions that define lines, curves, text, ovals, and other geometric shapes.
A) Bitmap images
B) Metafile graphics
C) Vector graphics
D) Line-art images
A) Bitmap images
B) Metafile graphics
C) Vector graphics
D) Line-art images
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
____ steganography places data from the secret file into the host file without displaying the secret data when you view the host file in its associated program.
A) Replacement
B) Append
C) Substitution
D) Insertion
A) Replacement
B) Append
C) Substitution
D) Insertion
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Operating systems do not have tools for recovering image files.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
Bitmap images are collections of dots, or pixels, that form an image.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
____ images store graphics information as grids of individual pixels.
A) Bitmap
B) Raster
C) Vector
D) Metafiles
A) Bitmap
B) Raster
C) Vector
D) Metafiles
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
Match each item with a statement below
a.Pixels
f.Steganalysis tools
b.Hex Workshop
g.GIMP
c.Adobe Illustrator
h.XIF
d.Microsoft Office Picture Manager
i.Metafile graphics
e.JPEG
short for "picture elements"
a.Pixels
f.Steganalysis tools
b.Hex Workshop
g.GIMP
c.Adobe Illustrator
h.XIF
d.Microsoft Office Picture Manager
i.Metafile graphics
e.JPEG
short for "picture elements"
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
A graphics program creates and saves one of three types of image files: bitmap, vector, or ____________________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Match each item with a statement below
a.Pixels
f.Steganalysis tools
b.Hex Workshop
g.GIMP
c.Adobe Illustrator
h.XIF
d.Microsoft Office Picture Manager
i.Metafile graphics
e.JPEG
graphics file format that uses lossy compression
a.Pixels
f.Steganalysis tools
b.Hex Workshop
g.GIMP
c.Adobe Illustrator
h.XIF
d.Microsoft Office Picture Manager
i.Metafile graphics
e.JPEG
graphics file format that uses lossy compression
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
All ____________________ files start at position zero (offset 0 is the first byte of a file) with hexadecimal 49 49 2A.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
Under copyright laws, maps and architectural plans may be registered as ____.
A) pantomimes and choreographic works
B) artistic works
C) literary works
D) pictorial, graphic, and sculptural works
A) pantomimes and choreographic works
B) artistic works
C) literary works
D) pictorial, graphic, and sculptural works
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
When working with image files, computer investigators also need to be aware of ____ laws to guard against copyright violations.
A) international
B) forensics
C) copyright
D) civil
A) international
B) forensics
C) copyright
D) civil
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
Match each item with a statement below
a.Pixels
f.Steganalysis tools
b.Hex Workshop
g.GIMP
c.Adobe Illustrator
h.XIF
d.Microsoft Office Picture Manager
i.Metafile graphics
e.JPEG
drawing program that creates vector files
a.Pixels
f.Steganalysis tools
b.Hex Workshop
g.GIMP
c.Adobe Illustrator
h.XIF
d.Microsoft Office Picture Manager
i.Metafile graphics
e.JPEG
drawing program that creates vector files
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
Match each item with a statement below
a.Pixels
f.Steganalysis tools
b.Hex Workshop
g.GIMP
c.Adobe Illustrator
h.XIF
d.Microsoft Office Picture Manager
i.Metafile graphics
e.JPEG
Gnome graphics editor
a.Pixels
f.Steganalysis tools
b.Hex Workshop
g.GIMP
c.Adobe Illustrator
h.XIF
d.Microsoft Office Picture Manager
i.Metafile graphics
e.JPEG
Gnome graphics editor
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
Match each item with a statement below
a.Pixels
f.Steganalysis tools
b.Hex Workshop
g.GIMP
c.Adobe Illustrator
h.XIF
d.Microsoft Office Picture Manager
i.Metafile graphics
e.JPEG
Microsoft image viewer
a.Pixels
f.Steganalysis tools
b.Hex Workshop
g.GIMP
c.Adobe Illustrator
h.XIF
d.Microsoft Office Picture Manager
i.Metafile graphics
e.JPEG
Microsoft image viewer
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
____________________ is the process of coding of data from a larger form to a smaller form.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
____ has also been used to protect copyrighted material by inserting digital watermarks into a file.
A) Encryption
B) Steganography
C) Compression
D) Archiving
A) Encryption
B) Steganography
C) Compression
D) Archiving
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
Under copyright laws, computer programs may be registered as ____.
A) literary works
B) motion pictures
C) architectural works
D) audiovisual works
A) literary works
B) motion pictures
C) architectural works
D) audiovisual works
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
Match each item with a statement below
a.Pixels
f.Steganalysis tools
b.Hex Workshop
g.GIMP
c.Adobe Illustrator
h.XIF
d.Microsoft Office Picture Manager
i.Metafile graphics
e.JPEG
tool used to rebuild image file headers
a.Pixels
f.Steganalysis tools
b.Hex Workshop
g.GIMP
c.Adobe Illustrator
h.XIF
d.Microsoft Office Picture Manager
i.Metafile graphics
e.JPEG
tool used to rebuild image file headers
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
Match each item with a statement below
a.Pixels
f.Steganalysis tools
b.Hex Workshop
g.GIMP
c.Adobe Illustrator
h.XIF
d.Microsoft Office Picture Manager
i.Metafile graphics
e.JPEG
combinations of bitmap and vector images
a.Pixels
f.Steganalysis tools
b.Hex Workshop
g.GIMP
c.Adobe Illustrator
h.XIF
d.Microsoft Office Picture Manager
i.Metafile graphics
e.JPEG
combinations of bitmap and vector images
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
Match each item with a statement below
a.Pixels
f.Steganalysis tools
b.Hex Workshop
g.GIMP
c.Adobe Illustrator
h.XIF
d.Microsoft Office Picture Manager
i.Metafile graphics
e.JPEG
image format derived from the TIFF file format
a.Pixels
f.Steganalysis tools
b.Hex Workshop
g.GIMP
c.Adobe Illustrator
h.XIF
d.Microsoft Office Picture Manager
i.Metafile graphics
e.JPEG
image format derived from the TIFF file format
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
____ steganography replaces bits of the host file with other bits of data.
A) Insertion
B) Replacement
C) Substitution
D) Append
A) Insertion
B) Replacement
C) Substitution
D) Append
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
In the following list, ____ is the only steg tool.
A) EnCase
B) iLook
C) DriveSpy
D) Outguess
A) EnCase
B) iLook
C) DriveSpy
D) Outguess
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
The two major forms of steganography are ____________________ and substitution.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
Match each item with a statement below
a.Pixels
f.Steganalysis tools
b.Hex Workshop
g.GIMP
c.Adobe Illustrator
h.XIF
d.Microsoft Office Picture Manager
i.Metafile graphics
e.JPEG
are also called steg tools
a.Pixels
f.Steganalysis tools
b.Hex Workshop
g.GIMP
c.Adobe Illustrator
h.XIF
d.Microsoft Office Picture Manager
i.Metafile graphics
e.JPEG
are also called steg tools
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
The ____________________ is the best source for learning more about file formats and their associated extensions.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
Give a brief overview of copyright laws pertaining to graphics within and outside the U.S.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
Explain how someone can use a disk editor tool to mark clusters as "bad" clusters.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
Briefly describe the Exchangeable Image File (EXIF) format.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
Write a brief history of steganography.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
Explain how steganalysis tools work.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
Identify and describe some image viewers.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
Explain how lossless compression relates to image file formats.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
Describe how to hide information on an 8-bit bitmap image file using substitution steganography.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
How does vector quantization (VQ) compress data?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
Present a list of categories covered under copyright laws in the U.S.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck