A SYN attack exploits what aspect of TCP communications?
Answer : A
When handling evidence, which of the following is not a common guideline?
Answer : B
Which of the following is NOT a necessary step when documenting the crime scene?
Answer : A
Which of the following is not related to Rules of Evidence?
Answer : D
There are two types of evidence: what are they?
Answer : A
Compression of collected evidence can't be utilized because:
Answer : D
According to IIFS100, the following is the proper sequence for image verification:
Answer : A