ECCouncil EC-Council Certified Security Analyst (ECSA) EC0-479 Question # 53 Topic 6 Discussion

ECCouncil EC-Council Certified Security Analyst (ECSA) EC0-479 Question # 53 Topic 6 Discussion

EC0-479 Exam Topic 6 Question 53 Discussion:
Question #: 53
Topic #: 6

One technique for hiding information is to change the file extension from the correct one to one that might not be noticed by an investigator. For example, changing a .jpg extension to a .doc extension so that a picture file appears to be a document. What can an investigator examine to verify that a file has the correct extension?


A.

the File Allocation Table


B.

the file header


C.

the file footer


D.

the sector map


Get Premium EC0-479 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.