Chapter 08: Recovering Graphics Files

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 29

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

30 Terms

1

Bitmap images are collections of dots, or pixels, in a grid format that form a graphic.

True

New cards
2

Operating systems do not have tools for recovering image files.

False

New cards
3

If a graphics file is fragmented across areas on a disk, you must recover all the fragments before re-creating the file.

True

New cards
4

With many computer forensics tools, you can open files with external viewers.

True

New cards
5

Steganography cannot be used with file formats other than image files.

False

New cards
6

____ are based on mathematical instructions that define lines, curves, text, ovals, and other geometric shapes.

A. Bitmap images C. Vector Graphics

B. Metafile graphics D. Line-art images

Vector graphics

New cards
7

You use ____ to create, modify, and save bitmap, vector, and metafile graphics.

A. Graphic viewers B, Image Readers

C. Image Viewers D. Line - art images

graphics editor

New cards
8

____ images store graphics information as grids of pixels.

A. Bitmap B, Image readers

C.Image Viewers D. Graphic editors

Bitmap

New cards
9

The process of converting raw picture data to another format is referred to as ____.
A. Abstracting B. Rastering

C. Demosaicing D. Rendering

demosaicing

New cards
10

Most digital photographs are stored in the ____ format.

A. EXIF B. TUFF

C. PNG D. GIF

EXIF

New cards
11

____ compression compresses data by permanently discarding bits of information in the file.

A. Redundant B. Lossy

C. Huffman D. Lossless

Lossy

New cards
12

Recovering fragments of a file is called ____.

A. Carving B. Slacking

C. Saving D. Rebuilding

carving

New cards
13

The JFIF ____ format has a hexadecimal value of FFD8 FFE0 in the first four bytes.

A. EPS B. BMP

C. GIF D. JPEG

JPEG

New cards
14

If you can't open a graphics file in an image viewer, the next step is to examine the file's ____.

A. files extension B. File name

C. File header data D. File size

header data

New cards
15

The uppercase letter ____ has a hexadecimal value 41.

A. “A” B. “B”

C. “G” D. “Z”

"A"

New cards
16

The image format XIF is derived from the more common ____ file format.

A. GIF B. JPEG

C. BMP D. TIF

TIF

New cards
17

The simplest way to access a file header is to use a(n) ____ editor

A. Hexadecimal editor B. Image editor

C. Use a disk editor D. Use a text editor

hexadecimal

New cards
18

The ____ header starts with hexadecimal 49 49 2A and has an offset of four bytes of 5C 01 00 00 20 65 58 74 65 6E 64 65 64 20 03.

A. TIFF B. XIF

C. JPEG D. GIF

XIF

New cards
19

____ is a data-hiding technique that uses host files to cover the contents of a secret message.

A. Steganography B. Steganalysis

C. Graphie D. Steganos

Steganography

New cards
20

____ steganography places data from the secret file into the host file without displaying the secret data when you view the host file in its associated program.

A. Replacement B. Pixelation

C. Substitution D. Insertion

Insertion

New cards
21

____ steganography replaces bits of the host file with other bits of data.

A. Insertion B. Replacement

C. Substitution D. Pixelation

Substitution

New cards
22

Steganalysis tools are also called ____.

A. Image editors B. Image tools

C. Hexadecimal editors D. Steg tools

steg tools

New cards
23

____ has been used to protect copyrighted material by inserting digital watermarks into a file.

A. Encryption B. Steganography

C. Compression D. Archiving

Steganography

New cards
24

When working with image files, computer investigators also need to be aware of ____ laws to guard against copyright violations.

A. International B. Forensics

C. Copyright D. Civil

copyright

New cards
25

Under copyright laws, computer programs may be registered as ____.

A. Literary works B. Motion pictures

C. Architectural works D. Audiovisual lyrics

literary works

New cards
26

Under copyright laws, maps and architectural plans may be registered as pictorial, graphic, and sculptural works.

True

New cards
27

A graphics program creates and saves one of three types of image files: bitmap, vector, or XIF.

False

New cards
28

The Internet is the best source for learning more about file formats and their extensions.

True

New cards
29

All TIF files start at position zero (offset 0 is the first byte of a file) with hexadecimal 49 49 3B.

False

New cards
30

The two major forms of steganography are insertion and substitution.

True

New cards
robot