What should you use to verify evidence and thus ensure its integrity?
a. Hash algorithms
b. Watermarks
c. Steganography
d. Digital certificates
ANSWER: a
Computer Science & Information Technology
You might also like to view...
A(n) ________ is a miniature image of a PowerPoint slide
Fill in the blank(s) with correct word
Computer Science & Information Technology
A gray box displays around fieldset elements
Indicate whether the statement is true or false
Computer Science & Information Technology
Sarbanes-Oxley (SOX)
A. imposes new corporate disclosure requirements B. imposes new criminal penalties for fraud C. both a. and b. D. none of the above
Computer Science & Information Technology
The first step in the design of an object-oriented program is to:
a. Determine the input. b. Determine the output. c. Determine the requirements of the program in terms of input, output, and needed data requirements. d. All of the above. e. None of the above.
Computer Science & Information Technology