?Describe two methods for filtering data- separating good data from suspicious data.

What will be an ideal response?

?To filter data, you can use hash values to create a known good hash value list of a fresh installation of an OS, all applications, and known good images and documents (spreadsheets, test files, and so on). With this information, an investigator could ignore all files on this known good list and focus on other files that aren't on this list.Another way to filter data is analyzing and verifying header values for known file types. Each file type has a header value associated with a file extension, and many forensic tools include a list of common file headers. To view these file headers, you use a hexadecimal editor, which can tell you whether a file extension is incorrect for the file type.

Computer Science & Information Technology

You might also like to view...

Windows 10 has integrated OneDrive into File Explorer, thereby simplifying the process of organizing and managing OneDrive folders and ensuring file synchronization

Indicate whether the statement is true or false

Computer Science & Information Technology

To display the Output workspace, press ____.

a. Insert b. CTRL+F4 c. Adobe, select Web Panel d. the menu bar, then press Bridge

Computer Science & Information Technology