Chapter 8 Quiz
False
Operating systems do not have tools for recovering image files. True False
True
Steganography can be used with file formats other than image files. True False
True
The two major forms of steganography are insertion and substitution. True False
Substitution
Which data-hiding technique replaces bits of the host file with other bits of data? Pixelation Substitution Replacement Insertion
Carving
Which term refers to recovering fragments of a file? Saving Slacking Reconstructing Carving
Use a hex editor
What is the easiest way to access a file's header? User a text editor Use a hex editor User an image editor User a disk editor
Data compression
What is the process of coding data from a larger format to a smaller form? Data analysis Data encapsulation Data encryption Data compression
Examine the file's header
What should the next step be if you cannot open a graphics file with an image viewer? Examine the file's header Examine the file's extension Examine the file's size Examine the file's name
Graphics Editors
What tools are used to create, modify, and save bitmap, vector, and metafile graphics? Graphics Editors Image Viewers Image Readers Graphic Viewers
Watermarking
What type of steganography is used to protect copyrighted material? Watermarking Compression Archiving Steganalysis
Steganography
Which term refers to a data hiding technique that uses host files to cover the contents of a secret message? Steganography Steganalysis Steganos Graphite
Lossy
Which type of compression compresses data permanently by discarding bits of information in the file? Lossy Lossless Redundant Huffman
As literary works
How may computer programs be registered under copyright laws? As literary works As architectural works As motion pictures As audiovisual works
True
If a graphics file is fragmented across a disk, you must recover all the fragments before re-creating the file. True False
EXIF
In which format are most digital photographs stored? TIFF PNG GIF EXIF
