Computer evidence at a crime scene is documented with a tag stating who had possession of the evidence at a given time. Which of the following does this illustrate?

A. System image capture
B. Record time offset
C. Order of volatility
D. Chain of custody


Answer: D. Chain of custody

Computer Science & Information Technology

You might also like to view...

When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as ________

A) pretexting B) polymorphing C) phishing D) pharming

Computer Science & Information Technology

A user called the help desk to report that her mobile device has apps on it that she does not remember installing. Several times throughout the day, she receives alerts in the notification bar from apps she does not recognize asking for permission to download and upload data.   Which of the following is the most likely cause for this behavior?

A. The mobile device has malware on it. B. The company has pushed these apps to the device. C. The anti-malware software is detecting and deleting infected apps. D. The device is performing an OS update.

Computer Science & Information Technology

The _____ function is an XPath 2.0 function used to retrieve XML data from external files.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The statement System.out.printf("%3.1e", 1234.56) outputs ___________.

a. 0.1e+04 b. 0.123456e+04 c. 0.123e+04 d. 1.2e+03 e. 1.23+03

Computer Science & Information Technology