To establish and maintain digital evidence integrity, which technique is utilized?
Steganography
Encryption
Hashing
Biometrics

Information Security Exercises are loading ...