Because digital forensics tools have limitations in performing hashing, what tools should be used to ensure data integrity?
a. High-level language assemblers
b. HTML editors
c. Hexadecimal editors
d. Steganalysis tools
ANSWER: c
Computer Science & Information Technology
You might also like to view...
MC A relational database is composed of_________ .
a) queries. b) tables. c) models. d) None of the above.
Computer Science & Information Technology
Formal ____ are the most effective means to ensure general assurance of the compliance process.
A. management of controls B. infrastructures of controls C. certification of controls D. compliance of controls
Computer Science & Information Technology
A field's ________ determines what will show in a datasheet, form, and report label
A) caption B) input mask C) data type D) foreign key
Computer Science & Information Technology
A ________ is a built-in program that performs operations on data
A) function B) subroutine C) formula D) parameter
Computer Science & Information Technology