While performing basic forensic analysis of a hard drive in Sara's, the security administrator, possession, which of the following should be verified during the analysis?

A. Witness statements
B. Image hashes
C. Chain of custody
D. Order of volatility


Answer: B. Image hashes

Computer Science & Information Technology

You might also like to view...

Which of the following statements is equivalent to the statement dblTotal = dblTotal + dblScore?

dblTotal += dblScore dblScore += dblTotal dblTotal =+ dblScore dblScore =+ dblTotal

Computer Science & Information Technology

EX Case 7-1Harry is hiking part of the Appalachian Trail this summer and using Excel to keep track of the miles he travels each day. Each time he reaches a town, he uses a public computer to update a worksheet that he stores on Windows Live SkyDrive. To send a worksheet via SkyDrive, Harry would click the ____ tab, then click Save & Send.

A. File B. Home C. Insert D. View

Computer Science & Information Technology

How does a digital signal compare to an analog signal??

What will be an ideal response?

Computer Science & Information Technology

Ethernet/IP packet networks:

a. are supported with gigabit fiber optic networks in large cities b. are offered only by the common carriers c. use token ring layer 2 media access control d. use IPX/SPX protocols e. provide CIR up to a maximum of 1.544 Mbps

Computer Science & Information Technology