Question 31

- (Topic 1)
In an echo data hiding technique, the secret message is embedded into a ____ as an echo.

Correct Answer:A

Question 32

- (Topic 3)
What binary coding is used most often for e-mail purposes?

Correct Answer:D

Question 33

- (Topic 2)
What feature of Decryption Collection allows an investigator to crack a password as quickly as possible?

Correct Answer:B

Question 34

- (Topic 3)
This type of testimony is presented by someone who does the actual fieldwork and does not offer a view in court.

Correct Answer:A

Question 35

- (Topic 1)
How do you define forensic computing?

Correct Answer:A

Question 36

- (Topic 1)
LBA (Logical Block Address) addresses data by allotting a to each sector of the hard disk.

Correct Answer:A

START 312-49v9 EXAM