After you open e-mail headers, copy and paste them into a text document so that you can read them with a text editor, such as Windows ____.
The files that provide helpful information to an e-mail inve…
The files that provide helpful information to an e-mail investigation are log files and ____ files.
With Mac OSs, a system application called ____ tracks each b…
With Mac OSs, a system application called ____ tracks each block on a volume to determine which blocks are in use and which ones are available to receive data.
In Linux, most applications and commands are in the ____ dir…
In Linux, most applications and commands are in the ____ directory or its subdirectories bin and sbin.
People who want to hide data can also use advanced encryptio…
People who want to hide data can also use advanced encryption programs, such as PGP or ____.
The term ____ comes from the Greek word for “hidden writing….
The term ____ comes from the Greek word for “hidden writing.”
AccessData ____ compares known file hash values to files on…
AccessData ____ compares known file hash values to files on your evidence drive or image files to see whether they contain suspicious data.
____ involves sorting and searching through investigation fi…
____ involves sorting and searching through investigation findings to separate good data and suspicious data.
In Microsoft Exchange, a(n) ____ file is responsible for mes…
In Microsoft Exchange, a(n) ____ file is responsible for messages formatted with MAPI.
The ____ is where directories and files are stored on a disk…
The ____ is where directories and files are stored on a disk drive.