A forensic image of a hard drive has been created. Which of the following can be used to demonstrate the image has not been tampered with?
A. Chain of custody
B. Document the image file's size and time stamps
C. Encrypt the image file
D. Hash of the image file
Answer: D. Hash of the image file
You might also like to view...
The Internet tier system starts with a backbone network connected via _____________________ to regional Internet service providers.
Fill in the blank(s) with the appropriate word(s).
Write a recursive method that will compute the sum of all the values in an array.
What will be an ideal response?
Case-Based Critical Thinking Questions ? Case 6-1 Simon is having trouble using linked workbooks, so he consults his colleague Brooke for help. ? ? Simon tells Brooke that when he attempts to open a workbook, the Edit Links dialog box appears with the message "This workbook contains one or more links that cannot be updated." Brooke suggests several possible causes of this error message. Which of the following is a possible cause?
A. one of the workbook's source files was edited B. one of the workbook's source files was copied to a different folder C. one of the workbook's source files was replaced with an updated file of the same name D. the workbook was sent to him without links
Using ____________________ is the only available option for checking absolute or external links.
Fill in the blank(s) with the appropriate word(s).