banner



Digital Pictures Use Data Compression To Accomplish Which Of The Following Goals?

Which of the following represents known files you can eliminate

1.

Which of the post-obit represents known files you can eliminate from an investigation? (Choose all that apply.)

  • a.
  • Any graphics files
  • b.
  • Files associated with an awarding
  • c.
  • Organisation files the Os uses
  • d.
  • Any files pertaining to the company

2.

For which of the post-obit reasons should yous wipe a target drive?

  • a.
  • To ensure the quality of digital evidence you learn
  • b.
  • To make sure unwanted data isn't retained on the bulldoze
  • c.
  • Neither of the above
  • d.
  • Both a and b

iii.

FTK's Known File Filter (KFF) can exist used for which of the following purposes? (Cull all that apply.)

  • a.
  • Filter known programme files from view.
  • b.
  • Summate hash values of image files.
  • c.
  • Compare hash values of known files to evidence files.
  • d.
  • Filter out evidence that doesn't relate to your investigation.

4.

For what legal and illegal purposes tin you lot utilize steganography?

5.

Password recovery is included in all computer forensics tools. True or False?

6.

After y'all shift a file'southward bits, the hash value remains the same. Truthful or False?

7.

Validating an image file once, the showtime fourth dimension you open it, is enough. True or False?

8.

_____________ happens when an investigation goes beyond the bounds of its original clarification.

9.

Suppose you're investigating an electronic mail harassment case. Generally, is collecting show for this type of case easier for an internal corporate investigation or a criminal investigation?

  • a.
  • Criminal investigation considering subpoenas can be issued to acquire any needed prove speedily
  • b.
  • Criminal investigation because law enforcement agencies have more than resource at their disposal
  • c.
  • Internal corporate investigation considering corporate investigators typically have ready access to company records
  • d.
  • Internal corporate investigation considering ISPs almost always plough over e-mail and access logs when requested by a large corporation

10.

You're using Disk Manager to view principal and extended partitions on a suspect's drive. The program reports the extended partition'southward full size equally larger than the sum of the sizes of logical partitions in this extended partition. What might y'all infer from this information?

  • a.
  • The disk is corrupted.
  • b.
  • At that place's a hidden sectionalisation.
  • c.
  • Nix; this is what y'all'd expect to see.
  • d.
  • The drive is formatted incorrectly.

xi.

Commercial encryption programs often rely on a technology known as _____________ to recover files if a password or passphrase is lost.

12.

Steganography is used for which of the following purposes?

  • a.
  • Validating information
  • b.
  • Hiding data
  • c.
  • Accessing remote computers
  • d.
  • Creating strong passwords

thirteen.

Which FTK search pick is more likely to find text subconscious in unallocated space: live search or indexed search?

14.

Which of the post-obit statements about HDHOST is truthful? (Choose all that apply.)

  • a.
  • It can be used to access a suspect's calculator remotely.
  • b.
  • It requires installing the DiskExplorer program corresponding to the suspect's file organisation.
  • c.
  • It can run surreptitiously to avoid detection.
  • d.
  • It works over both serial and TCP/IP interfaces.

xv.

Which of the following tools is most helpful in accessing clusters marked as "bad" on a disk?

  • a.
  • Norton DiskEdit
  • b.
  • FTK
  • c.
  • ProDiscover
  • d.
  • HDHOST
  • due east.
  • None of the in a higher place

one.

Graphics files stored on a computer tin't be recovered after they are deleted. True or False?

2.

When yous carve a graphics file, recovering the image depends on which of the following skills?

  • a.
  • Recovering the image from a tape backup
  • b.
  • Recognizing the pattern of the data content
  • c.
  • Recognizing the pattern of the file header content
  • d.
  • Recognizing the pattern of a corrupt file

3.

Explain how to identify an unknown graphics file format that your estimator forensics tool doesn't recognize.

4.

What type of pinch uses an algorithm that allows viewing the graphics file without losing any portion of the data?

v.

When investigating graphics files, you should convert them into ane standard format. True or Imitation?

half dozen.

Digital pictures use information compression to attain which of the post-obit goals? (Choose all that apply.)

  • a.
  • Save space on a difficult drive.
  • b.
  • Provide a crisp and articulate prototype.
  • c.
  • Eliminate redundant data.
  • d.
  • Produce a file that can exist e-mailed or posted on the Internet.

7.

Salvaging a file is also known in North America by which of the following terms?

  • a.
  • Information recovery
  • b.
  • Scavenging
  • c.
  • Recycle Bin
  • d.
  • Etching

8.

In JPEG files, what'southward the starting offset position for the JFIF label?

  • a.
  • Starting time 0
  • b.
  • Offset 2
  • c.
  • Offset 6
  • d.
  • Offset 4

9.

Each blazon of graphics file has a unique header containing information that distinguishes it from other types of graphics files. True or Faux?

10.

Copyright laws don't apply to Web sites. Truthful or False?

eleven.

When viewing a file header, you lot need to include hexadecimal information to view the epitome. True or False?

12.

When recovering a file with ProDiscover, your starting time objective is to recover cluster values. True or False?

13.

Bitmap (.bmp) files use which of the following types of pinch?

  • a.
  • WinZip
  • b.
  • Lossy
  • c.
  • Lzip
  • d.
  • Lossless

xiv.

A JPEG file uses which blazon of compression?

  • a.
  • WinZip
  • b.
  • Lossy
  • c.
  • Lzip
  • d.
  • Lossless

xv.

Only one file format tin can compress graphics files. Truthful or False?

Answers

Condition NEW Posted 24 Oct 2017 05:10 AM My Cost 10.00

-----------  ----------- H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Thursday-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d south-----------olu-----------tio-----------northward. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------due east a----------- me-----------ssa-----------ge -----------I westward-----------ill----------- be----------- qu-----------ick-----------ly

Non Rated(0)

  • Purchase Reply

Digital Pictures Use Data Compression To Accomplish Which Of The Following Goals?,

Source: https://www.sobtell.com/q/tutorial/default/160736-which-of-the-following-represents-known-files-you

Posted by: rothblead1998.blogspot.com

0 Response to "Digital Pictures Use Data Compression To Accomplish Which Of The Following Goals?"

Post a Comment

Iklan Atas Artikel

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel