One technique for hiding information is to change the file extension from the correct one to one that might not
be noticed by an investigator. For example, changing a .jpg extension to a .doc extension so that a picture fileappears to be a document. What can an investigator examine to verify that a file has the correct extension?
A.
the File Allocation Table
B.
the file header
C.
the file footer
D.
the sector map