ISTC2071 – Computer Forensics Chapter 8 Study Guide

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/19

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards

What kinds of images are based on mathematical instructions that define lines,
curves, text, ovals, and other geometric shapes?

Vector graphics

2
New cards

What tools are used to create, modify, and save bitmap, vector, and metafile
graphics?

Graphics editors

3
New cards

Which images store graphics information as grids of pixels?

Bitmap

4
New cards

What is the process of converting raw picture data to another format called?

Demosaicing

5
New cards

In which format are most digital photographs stored?

EXIF

6
New cards

Which type of compression compresses data permanently by discarding bits of
information in the file?

Lossy

7
New cards

What term refers to recovering fragments of a file?

Carving

8
New cards

Which JFIF format has a hexadecimal value of FFD8 FFE0 in the first four bytes?

JPEG

9
New cards

If a graphics file cannot be opened in an image viewer, what should the next step
be?

Examining the file’s header data

10
New cards

Which uppercase letter has a hexadecimal value 41?

“A”

11
New cards

From which file format is the image format XIF derived?

TIF

12
New cards

What is the simplest way to access a file header?

Use a hexadecimal editor

13
New cards

Which header starts with hexadecimal 49 49 2A and has an offset of four bytes of
5C 01 00 00 20 65 58 74 65 6E 64 65 64 20 03?

XIF

14
New cards

Which term refers to a data-hiding technique that uses host files to cover the
contents of a secret message?

Steganography

15
New cards

Which data-hiding technique places data from the secret file into the host file without
displaying the secret data when the host file is viewed in its associated program?

Insertion

16
New cards

Which data-hiding technique replaces bits of the host file with other bits of data?

Substitution

17
New cards

What is another term for steganalysis tools?

Steg tools

18
New cards

What technique has been used to protect copyrighted material by inserting digital
watermarks into a file?

Steganography

19
New cards

What type of laws should computer investigators be especially aware of
when working with image files in order to avoid infringement violations?

Copyright

20
New cards

How may computer programs be registered under copyright laws?

As literary works