1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
White raven [17]
3 years ago
13

Making the data impossible to recover even by applying physical forensics methods is known as __________ of media.

Computers and Technology
1 answer:
madam [21]3 years ago
3 0

Answer:

Anti-Forensic Techniques.

Explanation:

Anti-Forensic Techniques are thsoe techniques used to deviate the Forensic tools by injecting fake informations, hiding information, planting bugs, editing or erasing information, rendering it impossible to recover the data. It is a criminal way of hacking approach that restrains Forensics to find the hackers.

Anti-Forensic tools and techniques works in oppose to the Forensic tools and techniques that tries to recover the data, locate the hacker.

Thus the correct answer is anti-forensic techniques.

You might be interested in
Something I should look for when trying to decide if a source is credible is the publication's ....
storchak [24]
Answer: Date

Explanation: We receive new information everyday, and things are always changing. If something is old, it may need to be updated with the correct information
7 0
3 years ago
Why is a high-quality bond typically considered a lower-risk investment than a stock
FinnZ [79.3K]
Its high quality bond typically considered a lower risk investment than a stock because you need to find the answer on your own
5 0
3 years ago
Read 2 more answers
Select all the items that determine your preference for a concert ticket. a) band that is playing b) date of the concert c) pric
vlada-n [284]
I believe the answer is A, B, and C
8 0
3 years ago
If using the md5 hashing algorithm, what is the length to which each message is padded?
krek1111 [17]
If using the MD5 hashing algorithm, the length to which each message is padded 512 bits.

Answer: (d.) 512 bits.

MD5 stands for Message Digest 5. It is a hashing algorithm that is case sensitive.  It is a cryptographic hash values.

4 0
3 years ago
___ Jacking is a crime that takes place when a hacker misdirects URL to a different site. The Link Itself Looks Safe, But the us
const2013 [10]

Answer: Web Jacking

Here, the hacker takes control of a web site fraudulently. He may change the content of the original site or even redirect the user to another fake similar looking page controlled by him.


If you have any other questions about computers or even hacking hit me up because I know a lot about computers

6 0
3 years ago
Other questions:
  • If someone receives a shock, or a piece of equipment is throwing sparks or arcing you should try to pull them away from the sour
    7·1 answer
  • COMPUTER SCIENCE:PIXELS
    5·1 answer
  • "background" software that helps the computer manage its own internal resources is called ________.
    5·1 answer
  • Create a list with 5 numbers and find the smallest and largest number in the list and also the sum and product of the numbers in
    9·1 answer
  • The metric unit used for length
    5·1 answer
  • Witch icon allows you to see paragraph formatting feature
    6·1 answer
  • A computer is performing a binary search on the sorted list of 7 numbers below. What is the maximum number of iterations needed
    15·1 answer
  • Select the correct answer from each drop-down menu. A company is recruiting for a web designer. What kind of candidate should th
    14·2 answers
  • EXPLAIN WHY CRYPTOCURRENCIES ARE NOT RELIABLE.
    5·1 answer
  • A monitor is an output device. Which of the following is not a type of monitor? *
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!