Digital Forensics CH10

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Graphic Editors

You use _________ to create, modify, and save bitmap, vector, and metafile graphics files.

Steganography

_________ has also been used to protect copyrighted material by inserting digital watermarks into a file.

True

Bitmap images are collections of dots, or pixels, that form an image.

True

If a graphics file is fragmented across areas on a disk, first you must recover all the fragments to re-create the file.

Header Data

If you can't open an image file in an image viewer, the next step is to examine the file's _________.

False

Operating systems do not have tools for recovering image files.

False

Steganography cannot be used with file formats other than image files.

TIFF

The file format XIF is derived from the more common ____ file format.

EXIF

The majority of digital cameras use the _______ format to store digital pictures.

Literary works

Under copyright laws, computer programs may be registered as _______.

Lossy

______ compression compresses data by permanently discarding bits of information in the file.

Bitmap

_______ images store graphics information as grids of individual pixels.

Insertion

_______ steganography places data from the secret file into the host file without displaying the secret data when you view the host file in its associated program.

Steganography

________ is the art of hiding information inside image files.

Substitution

________ steganography replaces bits of the host file with other bits of data.

Vector Graphics

_________ are based on mathematical instructions that define lines, curves, text, ovals, and other geometric shapes.

JPEG

A(n) ______ file has a hexadecimal header value of FF D8 FF E0 00 10.

Carving

Recovering pieces of a file is called _______.

Demosaicing

The process or converting raw picture data to another format is referred to as _________.

Hexadecimal

The simplest way to access a file header is to use a(n) ________ editor.

Copyright

When working with image files, computer investigators also need to be aware of ________ laws to guard against copyright violations.

True

With many computer forensics tools, you can open files with external viewers.


संबंधित स्टडी सेट्स

Homeostasis & Cell Transport Study Island

View Set

Principles of Management (Ch 6, 7, 8, 9) (only thorugh 6.2 for now)

View Set

Group and Business Life Insurance Policies

View Set

MS 2 Exam 1 Sole Ch. 1-6 & Iggy 5,8

View Set

Exam 1 Practice Questions: Adult 1

View Set