Which of the following are useful in this scenario?

A forensics expert needs to be able to prove that digital evidence, originally taken into custody, has not been tampered with. Which of the following are useful in this
scenario?

A forensics expert needs to be able to prove that digital evidence, originally taken into custody, has not been tampered with. Which of the following are useful in this
scenario?

A.
Encryption

B.
Non-repudiation

C.
Hashing

D.
Perfect forward secrecy

E.
Steganography



Leave a Reply 1

Your email address will not be published. Required fields are marked *

5 × two =


Tyler

Tyler

same question as #26