1. Explain the process used to preserve the verifiable integrity
of digital evidence. How does this ensure that data is preserved
unmodified? How can an analyst show that the original evidence is
modified?
2. What are the major principles of risk analysis? List the
common steps in developing a risk analysis strategy.
Describe how tree rings form and how they can be used to address
scientific questions. In your answer, be sure to address both parts
of this question (how they form, how we use them) with specific
supporting details.