Which of teh following is useful in this scenario?

A forensics investigator needs to be able to prove that digital evidence was not tampered with after being taken into custody. Which of teh following is useful in this
scenario?

A forensics investigator needs to be able to prove that digital evidence was not tampered with after being taken into custody. Which of teh following is useful in this
scenario?

A.
Encryption

B.
Non-repudiation

C.
Hashing

D.
Perfect forward secrecy

E.
Steganography



Leave a Reply to Tyler Cancel reply1

Your email address will not be published. Required fields are marked *

3 × five =


Tyler

Tyler

Same question as #73