You mean when they screen shot it?
Answer:
C. DAT-1
Explanation:
Chain of custody is applied when examining digital evidence and checking for proof that no alterations have been made to the document. It ensures that the original piece of digital evidence which could be in text, image, video, or other electronic formats, is preserved and protected from alterations. Hashing algorithms which are mathematical computations that help to condense files are applied during this procedure.
Common hashing algorithms applied, include; the message digest 4, secure hashing algorithms 1, 2, 256, 224, 512, etc. The message digest 4 is used to evaluate why a particular piece of evidence was handled by an individual. This is further authenticated by examining the fingerprint.
Answer:
501.
Explanation:
In Transmission Control Protocol (TCP), sending and receiving of data is done as byte. These bytes are eventually grouped into packets referred to as segment.
The sequence number of the segment if all data is sent in only one segment is the same as the first byte of that segment.
In this scenario, a user datagram connection is sending 500 bytes to a client and the first byte is numbered 501. Thus, if all data is sent in only one segment, the sequence number of the segment is 501. The 501 represents the initial segment number (ISN).
However, assuming the same data was sent in five (5) segments. The sequence number would be;
First segment (1st) = 501.
Second segment (2nd) = 1501.
Third segment (3rd) = 2501.
Fourth segment (4th) = 3501.
Fifth segment (5th) = 4501.