Because digital forensics tools have limitations in performing hashing, what tools should be used to ensure data integrity?

a. High-level language assemblers
b. HTML editors
c. Hexadecimal editors
d. Steganalysis tools


ANSWER: c

Computer Science & Information Technology

You might also like to view...

MC A relational database is composed of_________ .

a) queries. b) tables. c) models. d) None of the above.

Computer Science & Information Technology

Formal ____ are the most effective means to ensure general assurance of the compliance process.

A. management of controls B. infrastructures of controls C. certification of controls D. compliance of controls

Computer Science & Information Technology

A field's ________ determines what will show in a datasheet, form, and report label

A) caption B) input mask C) data type D) foreign key

Computer Science & Information Technology

A ________ is a built-in program that performs operations on data

A) function B) subroutine C) formula D) parameter

Computer Science & Information Technology