Question 111

What do you call the process in which an attacker uses magnetic field over the digital media device to delete any previously stored data?
  • Question 112

    During forensics investigations, investigators tend to first collect the system time and then compare it with UTC. What does the abbreviation UTC stand for?
  • Question 113

    You should make at least how many bit-stream copies of a suspect drive?
  • Question 114

    What is kept in the following directory? HKLM\SECURITY\Policy\Secrets
  • Question 115

    In an echo data hiding technique, the secret message is embedded into a __________as an echo.