Digital
In linux in which directory are most system configuration files stored
/etc
On a linux computer what contains group memberships for the local system
/etc/group
Which data-hiding technique changes data from readable code to data that looks like a binary executable code ?
Bit shifting
What term refers to recovering fragments of a file
Carving
Type of laws that computer investigators need to be aware of
Copy right
What is the process of converting raw picture data to another format called ?
Demosacing
If a graphics file cannot be opened in an image viewer, what should the next step be ?
Examining the files extenstion
What is the simplest way to access a file header?
Hexadecimal editor
Because digital forensics tools have limitations in performing hashing, what's tools should be used to ensure data integrity
Hexadecimal editors
Scope creep
Increase the time and resources needed to extract analyze and present data
Which data hiding technique places data from the secret file into the host file without displaying the secret data when the host file is viewed in its associated program?
Insertion
What technology is designed to recover encrypted data if users forget their passphrase or if the user key is corrupted after a system failure?
Key escrow
Which type of compression compressed data permanently by discarding bits of information in the file
Lossy compression
Password stored in_____ hash values
MD5
What should be created in order to being a digital forensics case
N investigation plan
Which action alters hash values making cracking passwords more difficult?
Salting passwords
Limits data in a criminal investigation
Search warrant
Which term refers to a data hiding technique that uses host files to cover the contents of a secret message
Steganography
Which data hiding technique replaces bits of the host file with other bits of data ?
Substitution
What kinda of images are based on mathematical instructions that define lines curves, texts, ovals, and other geometric shapes?
Vector graphics