Lecture 5 (Part 3) Quiz

pdf

School

Cypress College *

*We aren’t endorsed by this school

Course

CIS-272

Subject

Computer Science

Date

Jan 9, 2024

Type

pdf

Pages

4

Uploaded by DukeWorld11631

Report
Lecture 5 (Part 3) Quiz & Due Oct 25, 2023 at 11:59pm Points 100 Questions 5 Available Oct 24, 2023 at 2:15pm - Oct 25, 2023 at 11:59pm Time Limit None Instructions Select he choice that best answers the question. This quiz was locked Oct 25, 2023 at 11:59pm. Attempt History Attempt Time Score LATEST Attempt 1 1,624 minutes 80 out of 100 Score for this quiz: 80 out of 100 Submitted Oct 25, 2023 at 5:20pm This attempt took 1,624 minutes. Question 1 0/20 pts Which of the following is not true about graphics files? ou Answered | A valid JPEG header expressed in hexidecimal notation begins with FFDSFFE1. orrect Answer A forensic examiner should use the forensic software tool for analysis to look beneath the top layer of a .jpg file.
A valid JPEG header expressed in hexidecimal notathion begins with FFDSFFEO. A forensic examiner can use file signature analysis feature to compare the file header with the file extension to determine whether the file name has been altered to something other than .jpg. Question 2 20 / 20 pts What is a spool file? Is is a special file that is used to transfer data between Windows and Mac OSX operating systems. It contains metadata about print jobs. It is a file that contains data in a continous loop where new data rep[aces the oldest data. It is a file that contains an image of each page sent to a printer for a given print job. Question 3 20 / 20 pts Which of the following statements is false regarding Alternate Data Streams?
It is a technique to transfer data faster by using two data streams at one and alternating data between them. They are stored as attributes in the Master File Table. Small files can be stored there so that their data are entirely within the MFT, and not searchable through the Windows File Directory. They were developed to hold the resource fork of data files from an old Mac with a Motorolla 68000 chip. Question 4 20 / 20 pts What is a shadow (,shd) file used for? It records the Most Recently Used (MRU) for each user on a system. It contains data from the resource fork of a file from an old Mac running the Motorolla 68000 chip. The operating system uses these to build a log file of the users' activities. It contains the metadata about a print job. Question 5 20 / 20 pts Which of the following statements is false regarding steganography?
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
The carrier file will appear to a human to behave normally after being injected with a payload. Steganogrpahy is difficult to detect. The payload file is hidden within the carrier file. The payload file must be larger than the carrier file. Quiz Score: 80 out of 100