There are some specialized tools that allow an investigator to dig out certain types of files from unallocated space by identifying the header of that file type and copying all of the information between the head and a valid end of file marker. What is the name for this technique?

a. File imaging
b. Data carving
c. File reconciliation
d. Magic number recovery


b. Data carving

Computer Science & Information Technology

You might also like to view...

Which of the following statements are true?

a. A handler object fires an event. b. A source object fires an event. c. Any object such a String object can fire an event. d. A handler is registered with the source object for processing the event.

Computer Science & Information Technology

Mailing lists can be downloaded from the Internet

Indicate whether the statement is true or false

Computer Science & Information Technology

A chart that you create in PowerPoint is stored in a Word table that is incorporated into the PowerPoint file.

a. true b. false

Computer Science & Information Technology

Which of the following is an encapsulated authentication protocol?

A. CCMP B. LEAP C. TKIP D. WEP

Computer Science & Information Technology