?
A. The process of creating a duplicate image of data; one of the required functions of digital forensics tools?
B. The process of trying every combination of characters--letters, numbers, and special characters typically found on a keyboard-- to find a matching password or passphrase value for an encrypted file?
C. A project sponsored by the National Institute of Standards and Technology to manage research on digital forensics tools?
D. The process of pulling relevant data from an image and recovering or reconstructing data fragments; one of the required functions of digital forensics tools.?
E. A method of finding files or other information by entering relevant characters, words, or phrases in a search tool?
F. A NIST project with the goal of collecting all known hash values for commercial software and OS files?
G. An attack that uses a collection of words or phrases that might be passwords for an encrypted file.
H. ?The process of rebuilding data files; one of the required functions of digital forensics tools.
I. A way to confirm that a tool is functioning as intended; one of the functions of digital forensics tools.?
J. A hardware device or software program that prevents a computer from writing data to an evidence drive?
A. ?acquisition
B. ?brute-force attack
C. ?Computer Forensics Tool Testing (CFTT)
D. extraction?
E. ?keyword search
F. National Software Reference Library (NSRL)?
G. ?password dictionary attack
H. reconstruction?
I. ?validation
J. write-blocker
You might also like to view...
A(n) ____________________ is the product or output of one or more Web-based files, which are displayed on your computer.
Fill in the blank(s) with the appropriate word(s).
____________________ circles are equidistant from each other.
Fill in the blank(s) with the appropriate word(s).
________ gridlines are the lines between designated label values
Fill in the blank(s) with the appropriate word(s).
Which of the following would be the correct address to use with the PING command when testing the functionality of a NIC?
A. 10.0.0.1 B. 127.0.0.1 C. 169.254.0.1 D. 255.255.255.1