New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

ECCouncil Computer Hacking Forensic Investigator 312-49 Question # 137 Topic 14 Discussion

ECCouncil Computer Hacking Forensic Investigator 312-49 Question # 137 Topic 14 Discussion

312-49 Exam Topic 14 Question 137 Discussion:
Question #: 137
Topic #: 14

One technique for hiding information is to change the file extension from the correct one to one that might not be noticed by an investigator. For example, changing a .jpg extension to a .doc extension so that a picture file appears to be a document. What can an investigator examine to verify that a file has the correct extension?


A.

the File Allocation Table


B.

the file header


C.

the file footer


D.

the sector map


Get Premium 312-49 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.