What should you use to verify evidence and thus ensure its integrity?

a. Hash algorithms
b. Watermarks
c. Steganography
d. Digital certificates


ANSWER: a

Computer Science & Information Technology

You might also like to view...

A(n) ________ is a miniature image of a PowerPoint slide

Fill in the blank(s) with correct word

Computer Science & Information Technology

A gray box displays around fieldset elements

Indicate whether the statement is true or false

Computer Science & Information Technology

Sarbanes-Oxley (SOX)

A. imposes new corporate disclosure requirements B. imposes new criminal penalties for fraud C. both a. and b. D. none of the above

Computer Science & Information Technology

The first step in the design of an object-oriented program is to:

a. Determine the input. b. Determine the output. c. Determine the requirements of the program in terms of input, output, and needed data requirements. d. All of the above. e. None of the above.

Computer Science & Information Technology