Forensics Mid term part 2
A secure storage container or cabinet should be made of ____ and include an internal cabinet lock or external padlock.
Steel
____ has been used to protect copyrighted material by inserting digital watermarks into a file.
Steganography
____ steganography replaces bits of the host file with other bits of data.
Substitution
A bit-stream copy should always be used when creating an image of a suspect's hard drive. (True or false)
True
A forensics analysis of a 6 TB disk, for example, can take several days or weeks.
True
The Internet is the best source for learning more about file formats and their extensions. (True or false)
True
The two major forms of steganography are insertion and substitution. (True or false)
True
To help determine which computer forensics tool to purchase, a comparison table of functions, subfunctions, and vendor products is useful. (True or false)
True
When you research for computer forensics tools, strive for versatile, flexible, and robust tools that provide technical support. (True or false)
True
A ____ is where you conduct your investigations, store evidence, and do most of your work.
Digital Forensics Lab
The simplest method of duplicating a disk drive is using a tool that makes a direct ____ copy from the suspect disk to the target location.
Disk-to-disk
Solid State Drive (SSD) is a type of hard drive interface. (True or false)
False
Software forensics tools are commonly used to copy data from a suspect's disk drive to a(n) ____.
Image file
____ steganography places data from the secret file into the host file without displaying the secret data when you view the host file in its associated program.
Insertion
Windows hard disks can now use a variety of file systems, including FAT16, FAT32, ____, and Resilient File System.
NTFS
