Deck 10: Recovering Graphics Files

Full screen (f)
exit full mode
Question
With many computer forensics tools, you can open files with external viewers.
Use Space or
up arrow
down arrow
to flip the card.
Question
Recovering pieces of a file is called ____.

A) carving
B) slacking
C) saving
D) rebuilding
Question
The majority of digital cameras use the ____ format to store digital pictures.

A) EXIF
B) TIFF
C) PNG
D) GIF
Question
Steganography cannot be used with file formats other than image files.
Question
A(n) ____ file has a hexadecimal header value of FF D8 FF E0 00 10.

A) EPS
B) BMP
C) GIF
D) JPEG
Question
The image format XIF is derived from the more common ____ file format.

A) GIF
B) JPEG
C) BMP
D) TIFF
Question
If you can't open an image file in an image viewer, the next step is to examine the file's ____.

A) extension
B) name
C) header data
D) size
Question
____ is the art of hiding information inside image files.

A) Steganography
B) Steganalysis
C) Graphie
D) Steganos
Question
____ compression compresses data by permanently discarding bits of information in the file.

A) Redundant
B) Lossy
C) Huffman
D) Lossless
Question
The process of converting raw picture data to another format is referred to as ____.

A) JEIDA
B) rastering
C) demosaicing
D) rendering
Question
You use ____ to create, modify, and save bitmap, vector, and metafile graphics files.

A) graphics viewers
B) image readers
C) image viewers
D) graphics editors
Question
The simplest way to access a file header is to use a(n) ____ editor

A) hexadecimal
B) image
C) disk
D) text
Question
The uppercase letter ____ has a hexadecimal value of 41.

A) "A"
B) "C"
C) "G"
D) "Z"
Question
The ____ header starts with hexadecimal 49 49 2A and has an offset of four bytes of 5C01 0000 2065 5874 656E 6465 6420 03.

A) TIFF
B) XIF
C) JPEG
D) GIF
Question
If a graphics file is fragmented across areas on a disk, first you must recover all the fragments to re-create the file.
Question
____ are based on mathematical instructions that define lines, curves, text, ovals, and other geometric shapes.

A) Bitmap images
B) Metafile graphics
C) Vector graphics
D) Line-art images
Question
____ steganography places data from the secret file into the host file without displaying the secret data when you view the host file in its associated program.

A) Replacement
B) Append
C) Substitution
D) Insertion
Question
Operating systems do not have tools for recovering image files.
Question
Bitmap images are collections of dots, or pixels, that form an image.
Question
____ images store graphics information as grids of individual pixels.

A) Bitmap
B) Raster
C) Vector
D) Metafiles
Question
Match each item with a statement below
a.Pixels
f.Steganalysis tools
b.Hex Workshop
g.GIMP
c.Adobe Illustrator
h.XIF
d.Microsoft Office Picture Manager
i.Metafile graphics
e.JPEG
short for "picture elements"
Question
A graphics program creates and saves one of three types of image files: bitmap, vector, or ____________________.
Question
Match each item with a statement below
a.Pixels
f.Steganalysis tools
b.Hex Workshop
g.GIMP
c.Adobe Illustrator
h.XIF
d.Microsoft Office Picture Manager
i.Metafile graphics
e.JPEG
graphics file format that uses lossy compression
Question
All ____________________ files start at position zero (offset 0 is the first byte of a file) with hexadecimal 49 49 2A.
Question
Under copyright laws, maps and architectural plans may be registered as ____.

A) pantomimes and choreographic works
B) artistic works
C) literary works
D) pictorial, graphic, and sculptural works
Question
When working with image files, computer investigators also need to be aware of ____ laws to guard against copyright violations.

A) international
B) forensics
C) copyright
D) civil
Question
Match each item with a statement below
a.Pixels
f.Steganalysis tools
b.Hex Workshop
g.GIMP
c.Adobe Illustrator
h.XIF
d.Microsoft Office Picture Manager
i.Metafile graphics
e.JPEG
drawing program that creates vector files
Question
Match each item with a statement below
a.Pixels
f.Steganalysis tools
b.Hex Workshop
g.GIMP
c.Adobe Illustrator
h.XIF
d.Microsoft Office Picture Manager
i.Metafile graphics
e.JPEG
Gnome graphics editor
Question
Match each item with a statement below
a.Pixels
f.Steganalysis tools
b.Hex Workshop
g.GIMP
c.Adobe Illustrator
h.XIF
d.Microsoft Office Picture Manager
i.Metafile graphics
e.JPEG
Microsoft image viewer
Question
____________________ is the process of coding of data from a larger form to a smaller form.
Question
____ has also been used to protect copyrighted material by inserting digital watermarks into a file.

A) Encryption
B) Steganography
C) Compression
D) Archiving
Question
Under copyright laws, computer programs may be registered as ____.

A) literary works
B) motion pictures
C) architectural works
D) audiovisual works
Question
Match each item with a statement below
a.Pixels
f.Steganalysis tools
b.Hex Workshop
g.GIMP
c.Adobe Illustrator
h.XIF
d.Microsoft Office Picture Manager
i.Metafile graphics
e.JPEG
tool used to rebuild image file headers
Question
Match each item with a statement below
a.Pixels
f.Steganalysis tools
b.Hex Workshop
g.GIMP
c.Adobe Illustrator
h.XIF
d.Microsoft Office Picture Manager
i.Metafile graphics
e.JPEG
combinations of bitmap and vector images
Question
Match each item with a statement below
a.Pixels
f.Steganalysis tools
b.Hex Workshop
g.GIMP
c.Adobe Illustrator
h.XIF
d.Microsoft Office Picture Manager
i.Metafile graphics
e.JPEG
image format derived from the TIFF file format
Question
____ steganography replaces bits of the host file with other bits of data.

A) Insertion
B) Replacement
C) Substitution
D) Append
Question
In the following list, ____ is the only steg tool.

A) EnCase
B) iLook
C) DriveSpy
D) Outguess
Question
The two major forms of steganography are ____________________ and substitution.
Question
Match each item with a statement below
a.Pixels
f.Steganalysis tools
b.Hex Workshop
g.GIMP
c.Adobe Illustrator
h.XIF
d.Microsoft Office Picture Manager
i.Metafile graphics
e.JPEG
are also called steg tools
Question
The ____________________ is the best source for learning more about file formats and their associated extensions.
Question
Give a brief overview of copyright laws pertaining to graphics within and outside the U.S.
Question
Explain how someone can use a disk editor tool to mark clusters as "bad" clusters.
Question
Briefly describe the Exchangeable Image File (EXIF) format.
Question
Write a brief history of steganography.
Question
Explain how steganalysis tools work.
Question
Identify and describe some image viewers.
Question
Explain how lossless compression relates to image file formats.
Question
Describe how to hide information on an 8-bit bitmap image file using substitution steganography.
Question
How does vector quantization (VQ) compress data?
Question
Present a list of categories covered under copyright laws in the U.S.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 10: Recovering Graphics Files
1
With many computer forensics tools, you can open files with external viewers.
True
2
Recovering pieces of a file is called ____.

A) carving
B) slacking
C) saving
D) rebuilding
A
3
The majority of digital cameras use the ____ format to store digital pictures.

A) EXIF
B) TIFF
C) PNG
D) GIF
A
4
Steganography cannot be used with file formats other than image files.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
A(n) ____ file has a hexadecimal header value of FF D8 FF E0 00 10.

A) EPS
B) BMP
C) GIF
D) JPEG
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
The image format XIF is derived from the more common ____ file format.

A) GIF
B) JPEG
C) BMP
D) TIFF
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
If you can't open an image file in an image viewer, the next step is to examine the file's ____.

A) extension
B) name
C) header data
D) size
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
____ is the art of hiding information inside image files.

A) Steganography
B) Steganalysis
C) Graphie
D) Steganos
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
____ compression compresses data by permanently discarding bits of information in the file.

A) Redundant
B) Lossy
C) Huffman
D) Lossless
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
The process of converting raw picture data to another format is referred to as ____.

A) JEIDA
B) rastering
C) demosaicing
D) rendering
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
You use ____ to create, modify, and save bitmap, vector, and metafile graphics files.

A) graphics viewers
B) image readers
C) image viewers
D) graphics editors
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
The simplest way to access a file header is to use a(n) ____ editor

A) hexadecimal
B) image
C) disk
D) text
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
The uppercase letter ____ has a hexadecimal value of 41.

A) "A"
B) "C"
C) "G"
D) "Z"
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
The ____ header starts with hexadecimal 49 49 2A and has an offset of four bytes of 5C01 0000 2065 5874 656E 6465 6420 03.

A) TIFF
B) XIF
C) JPEG
D) GIF
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
If a graphics file is fragmented across areas on a disk, first you must recover all the fragments to re-create the file.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
____ are based on mathematical instructions that define lines, curves, text, ovals, and other geometric shapes.

A) Bitmap images
B) Metafile graphics
C) Vector graphics
D) Line-art images
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
____ steganography places data from the secret file into the host file without displaying the secret data when you view the host file in its associated program.

A) Replacement
B) Append
C) Substitution
D) Insertion
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Operating systems do not have tools for recovering image files.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
Bitmap images are collections of dots, or pixels, that form an image.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
____ images store graphics information as grids of individual pixels.

A) Bitmap
B) Raster
C) Vector
D) Metafiles
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
Match each item with a statement below
a.Pixels
f.Steganalysis tools
b.Hex Workshop
g.GIMP
c.Adobe Illustrator
h.XIF
d.Microsoft Office Picture Manager
i.Metafile graphics
e.JPEG
short for "picture elements"
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
A graphics program creates and saves one of three types of image files: bitmap, vector, or ____________________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Match each item with a statement below
a.Pixels
f.Steganalysis tools
b.Hex Workshop
g.GIMP
c.Adobe Illustrator
h.XIF
d.Microsoft Office Picture Manager
i.Metafile graphics
e.JPEG
graphics file format that uses lossy compression
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
All ____________________ files start at position zero (offset 0 is the first byte of a file) with hexadecimal 49 49 2A.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
Under copyright laws, maps and architectural plans may be registered as ____.

A) pantomimes and choreographic works
B) artistic works
C) literary works
D) pictorial, graphic, and sculptural works
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
When working with image files, computer investigators also need to be aware of ____ laws to guard against copyright violations.

A) international
B) forensics
C) copyright
D) civil
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
Match each item with a statement below
a.Pixels
f.Steganalysis tools
b.Hex Workshop
g.GIMP
c.Adobe Illustrator
h.XIF
d.Microsoft Office Picture Manager
i.Metafile graphics
e.JPEG
drawing program that creates vector files
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
Match each item with a statement below
a.Pixels
f.Steganalysis tools
b.Hex Workshop
g.GIMP
c.Adobe Illustrator
h.XIF
d.Microsoft Office Picture Manager
i.Metafile graphics
e.JPEG
Gnome graphics editor
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
Match each item with a statement below
a.Pixels
f.Steganalysis tools
b.Hex Workshop
g.GIMP
c.Adobe Illustrator
h.XIF
d.Microsoft Office Picture Manager
i.Metafile graphics
e.JPEG
Microsoft image viewer
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
____________________ is the process of coding of data from a larger form to a smaller form.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
____ has also been used to protect copyrighted material by inserting digital watermarks into a file.

A) Encryption
B) Steganography
C) Compression
D) Archiving
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
Under copyright laws, computer programs may be registered as ____.

A) literary works
B) motion pictures
C) architectural works
D) audiovisual works
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
Match each item with a statement below
a.Pixels
f.Steganalysis tools
b.Hex Workshop
g.GIMP
c.Adobe Illustrator
h.XIF
d.Microsoft Office Picture Manager
i.Metafile graphics
e.JPEG
tool used to rebuild image file headers
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
Match each item with a statement below
a.Pixels
f.Steganalysis tools
b.Hex Workshop
g.GIMP
c.Adobe Illustrator
h.XIF
d.Microsoft Office Picture Manager
i.Metafile graphics
e.JPEG
combinations of bitmap and vector images
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
Match each item with a statement below
a.Pixels
f.Steganalysis tools
b.Hex Workshop
g.GIMP
c.Adobe Illustrator
h.XIF
d.Microsoft Office Picture Manager
i.Metafile graphics
e.JPEG
image format derived from the TIFF file format
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
____ steganography replaces bits of the host file with other bits of data.

A) Insertion
B) Replacement
C) Substitution
D) Append
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
In the following list, ____ is the only steg tool.

A) EnCase
B) iLook
C) DriveSpy
D) Outguess
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
The two major forms of steganography are ____________________ and substitution.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
Match each item with a statement below
a.Pixels
f.Steganalysis tools
b.Hex Workshop
g.GIMP
c.Adobe Illustrator
h.XIF
d.Microsoft Office Picture Manager
i.Metafile graphics
e.JPEG
are also called steg tools
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
The ____________________ is the best source for learning more about file formats and their associated extensions.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
Give a brief overview of copyright laws pertaining to graphics within and outside the U.S.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
Explain how someone can use a disk editor tool to mark clusters as "bad" clusters.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
Briefly describe the Exchangeable Image File (EXIF) format.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
Write a brief history of steganography.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
Explain how steganalysis tools work.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
Identify and describe some image viewers.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
Explain how lossless compression relates to image file formats.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
Describe how to hide information on an 8-bit bitmap image file using substitution steganography.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
How does vector quantization (VQ) compress data?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
Present a list of categories covered under copyright laws in the U.S.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.