1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IRISSAK [1]
3 years ago
5

Hashing algorithms are used on evidence files to uphold the chain of custody in an investigation. Which of the following is NOT

a hashing algorithm?
A. SHA-256
B. MD5
C. DAT-1
D. SHA-1
Computers and Technology
1 answer:
raketka [301]3 years ago
4 0

Answer:

C. DAT-1

Explanation:

Chain of custody is applied when examining digital evidence and checking for proof that no alterations have been made to the document. It ensures that the original piece of digital evidence which could be in text, image, video, or other electronic formats, is preserved and protected from alterations. Hashing algorithms which are mathematical computations that help to condense files are applied during this procedure.

Common hashing algorithms applied, include;  the message digest 4, secure hashing algorithms 1, 2, 256, 224, 512, etc. The message digest 4 is used to evaluate why a particular piece of evidence was handled by an individual. This is further authenticated by examining the fingerprint.

You might be interested in
What is the full form of com​
nignag [31]

The answer is:

Commercial

3 0
3 years ago
Explain and Define the four types of maintenance in IT?
crimeas [40]

Answer:

 The four types of maintenance in IT are given as:

Preventive maintenance: It is the important part to facilitates the management system and it should be designed carefully o prevent them from failure. the main aim of preventive maintenance is to successfully establish the design to improve the system performance.

Corrective maintenance:  It basically refers to the changes made to repair the defects in the implementation and designing of the system. It is usually performed after the failure occur in the equipment. It also increased overall productivity of the system.

Perfective maintenance: It basically improve the performance of the system, efficiency and maintainability. This type of maintenance are initiated by the IT department.

Adaptive maintenance: It involves the implementation changes in the system to increase its functionality. It basically improve its efficiency and increase its capability. It is less urgent than corrective maintenance.

7 0
3 years ago
Which two protocols manage neighbor discovery processes on ipv4 networks?.
serious [3.7K]

Answer:

Which two protocols manage neighbor discovery processes on IPv4 networks? TCP and UDP BGP and OSPF ICMP and ARP IPv4 and IPv6

Key Links. Pricing.

Subjects. Medical & Nursing.

Company. About Us.

Find Us.

Explanation:

6 0
2 years ago
The DHCP server is configured with the address lease duration set at 5 days. An employee returns to the office after an absence
Wewaii [24]

Answer:

both MAC and IPv4 addresses of the DHCP server

FF-FF-FF-FF-FF-FF and IPv4 address of the DHCP server

FF-FF-FF-FF-FF-FF and 255.255.255.255

MAC address of the DHCP server and 255.255.255.255

Explanation:

When the lease of a dynamically assigned IPv4 address has expired, a workstation will send a DHCPDISCOVER message to start the process of obtaining a valid IP address. Because the workstation does not know the addresses of DHCP servers, it sends the message via broadcast, with destination addresses of FF-FF-FF-FF-FF-FF and 255.255.255.255.

3 0
3 years ago
Read 2 more answers
Which resource do programmers sometimes have to refer to and use during planning the logical steps of the solution?
kenny6666 [7]
The answer would be a. pseudocode.

Pseudocode helps programs map out the logical pattern of how their program has to look. This means that by getting down the logical idea on how a program should look like, they will be able to implement this algorithm later on in the actual program. :)
3 0
3 years ago
Read 2 more answers
Other questions:
  • Candace opened an email from a person she didn't know and clicked on a pop-up in the email that installed a virus on her compute
    8·2 answers
  • What is the name of the option in most presentation applications with which you can modify slide elements?
    14·1 answer
  • The Earth's _______ is ductile overall, tending to flow very slowly and deform in a _______ manner.
    14·2 answers
  • for what reason do some security professionals consider insiders more dangerous than outside intruders?
    8·1 answer
  • Insurance can help you:
    12·1 answer
  • What social impact did the gunpowder have on society?
    12·1 answer
  • You are most likely to use<br> images for photos or digital paintings.
    6·1 answer
  • The feature that moves text from the right edge of a paragraph to the beginning of the next line as necessary to fit within the
    12·1 answer
  • An IT security threat is anything that might cause serious harm to a computer system.
    9·1 answer
  • What are the benefits and drawbacks of a desktop utilising virtualisation and a server?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!