Question 111
What do you call the process in which an attacker uses magnetic field over the digital media device to delete any previously stored data?
Question 112
During forensics investigations, investigators tend to first collect the system time and then compare it with UTC. What does the abbreviation UTC stand for?
Question 113
You should make at least how many bit-stream copies of a suspect drive?
Question 114
What is kept in the following directory? HKLM\SECURITY\Policy\Secrets
Question 115
In an echo data hiding technique, the secret message is embedded into a __________as an echo.
