Section A {Multiple Choice)
1. Hash values are used for which of the following purposes? (Choose two.)
A. Determining file size
B. Filtering known good files from potentially suspicious data
C. Reconstructing file fragments
D. Validating that the original data hasn't changed
[35 marks]
2. When validating the results of a forensic analysis, you should do which of the following?
(Choose two.)
A. Calculate the hash value with two different tools.
B. Use a different tool to compare the results of evidence you find.
C. Repeat the steps used to obtain the digital evidence, using the same tool, and recalculate
the hash value to verify the results.
D. Use a command-line tool and then a GUI tool.
3. When you carve a graphics file, recovering the image depends on which of the following
skills?
A. Recovering the image from a tape backup
B. Recognizing the pattern of the data content
C. Recognizing the pattern of the file header content
D. Recognizing the pattern of a corrupt file
4. When investigating graphics files, you should convert them into one standard format.
A. True
B. False
5. Digital pictures use data compression to accomplish which of the following goals? {Choose
two.)
A. Save space on a hard drive.
B. Provide a crisp and clear image.
C. Eliminate redundant data.
D. Produce a file that can be e-mailed or posted on the internet.
6. Jach type of graphics file has a unique header containing information that distinguishes it
from other types of graphics files.
A. True
B. False
7. Bitmap (.bmp) files use which of the following types of compression?
A. Winzip
B. Lossy
C. Lzip
D. Lossless
8. A JPEGfile uses which type of compression?
A. Winzip
B. Lossy
C. Lzip
D. Lossless
Page 11