Illustrate how an investigator would detect whether a suspect's drive contains hidden partitions.

What will be an ideal response?

Hiding partitions is a technique for concealing information.?To detect whether this technique has been used, be sure to account for all disk space when you're examining an evidence drive. Analyze any disk areas containing space you can't account for so that you can determine whether they contain additional evidence. These spaces are not accessible in File Explorer, but most digital forensics or hexadecimal editors could access it. Partition gaps are 128 bytes in Windows Vista and later, so any large gaps should be examined to see whether it contains and relevant evidence. In ProDiscover, a hidden partition appears as the highest available drive letter set in the BIOS,  other forensics tools have their own methods of assigning drive letters to hidden partitions. These assigned drive letters allow a digital forensics tool to access and examine the hidden partition.

Computer Science & Information Technology

You might also like to view...

Consider classes A, B and C, where A is an abstract superclass, B is a concrete class that inherits from A and C is a concrete class that inherits from B. Class A declares abstract method originalMethod, implemented in class B. Which of the following statements is true of class C?

a. Method originalMethod cannot be overridden in class C—once it has been implemented in concrete class B, it is implicitly final. b. Method originalMethod must be overridden in class C, or a compilation error will occur. c. If method originalMethod is not overridden in class C but is called by an object of class C, an error occurs. d. None of the above.

Computer Science & Information Technology

As DES became known as being too weak for highly classified communications, Double DES was created to provide a level of security far beyond that of DES. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology