ECCouncil EC-Council Certified Security Analyst (ECSA) 412-79 Question # 20 Topic 3 Discussion

ECCouncil EC-Council Certified Security Analyst (ECSA) 412-79 Question # 20 Topic 3 Discussion

412-79 Exam Topic 3 Question 20 Discussion:
Question #: 20
Topic #: 3

One technique for hiding information is to change the file extension from the correct one to one that might not be noticed by an investigator. For example, changing a .jpg extension to a .doc extension so that a picture file appears to be a document. What can an investigator examine to verify that a file has the correct extension?


A.

the File Allocation Table


B.

the file header


C.

the file footer


D.

the sector map


Get Premium 412-79 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.