A forensics investigator needs to be able to prove that digital evidence was not tampered with after being taken into custody. Which of teh following is useful in this
scenario?

A.
Encryption
B.
Non-repudiation
C.
Hashing
D.
Perfect forward secrecy
E.
Steganography
Same question as #73
0
0