True or False: 1. Malicious software Rootkit is used to hide the traces of hacking someone else's computer.
2. Malicious software Spyware is used to hide the traces of hacking someone else's computer.
3. Files that leave a trace about the actions performed in the system are called log files.
4. The digital investigation processes are in order: 1-analysis, 2-data acquisition, 3-conclusions
5. The capabilities of the offender to use the acoustic channel of information leakage are characterized by dependence on weather conditions and independence from the time of day.
6. In the DES cipher based on the Feistel network, initial permutation and round operations are performed during encryption.
7. Authentication in which the user is required to go through the procedure based on more than one factor is called multi-level authentication.