1.What process is used to ensure that evidence is kept secureand it's integrity is maintained from collection todestruction?
2.Blank image is an exact copy without the addition of anycompression or metadata.
3.What is the part of the hard drive that is not easilyaccessible to the user or the operating system?
4.
A firewall log is an example of a computer______
record while a budget spreadsheet is an example of acomputer_____record.