There are some specialized tools that allow an investigator to dig out certain types of files from unallocated space by identifying the header of that file type and copying all of the information between the head and a valid end of file marker. What is the name for this technique?
a. File imaging
b. Data carving
c. File reconciliation
d. Magic number recovery
b. Data carving
Computer Science & Information Technology
You might also like to view...
Which of the following statements are true?
a. A handler object fires an event. b. A source object fires an event. c. Any object such a String object can fire an event. d. A handler is registered with the source object for processing the event.
Computer Science & Information Technology
Mailing lists can be downloaded from the Internet
Indicate whether the statement is true or false
Computer Science & Information Technology
A chart that you create in PowerPoint is stored in a Word table that is incorporated into the PowerPoint file.
a. true b. false
Computer Science & Information Technology
Which of the following is an encapsulated authentication protocol?
A. CCMP B. LEAP C. TKIP D. WEP
Computer Science & Information Technology