Match the following investigative objectives to their proper chain of custody practices
I. Document the activities A. Verify the integrity of the copy to the source
II. Authenticate the copy B. Ensure fairness in the evaluation
III. Acquire the evidence C. Create a copy without altering the original
IV. Be objective and unbiased D. Keep detailed records and photographs
V. Analyze and filter the evidence E. Perform the technical analysis while
retaining its integrity
D A C B E
You might also like to view...
Discuss how the digital forensics professional ensures the integrity of the investigative process.
What will be an ideal response?
Number ________ controls how a value appears in a cell
Fill in the blank(s) with correct word
Because dashboards are designed for the specific needs of an end user, it is important to ensure once the dashboard contains all the required data that certain protections are in place to avoid accidental deletion of various objects or incorrect modifications
Indicate whether the statement is true or false
List the three components that the ICA uses.
What will be an ideal response?