Match the following investigative objectives to their proper chain of custody practices

I. Document the activities A. Verify the integrity of the copy to the source
II. Authenticate the copy B. Ensure fairness in the evaluation
III. Acquire the evidence C. Create a copy without altering the original
IV. Be objective and unbiased D. Keep detailed records and photographs
V. Analyze and filter the evidence E. Perform the technical analysis while
retaining its integrity


D A C B E

Computer Science & Information Technology

You might also like to view...

Discuss how the digital forensics professional ensures the integrity of the investigative process.

What will be an ideal response?

Computer Science & Information Technology

Number ________ controls how a value appears in a cell

Fill in the blank(s) with correct word

Computer Science & Information Technology

Because dashboards are designed for the specific needs of an end user, it is important to ensure once the dashboard contains all the required data that certain protections are in place to avoid accidental deletion of various objects or incorrect modifications

Indicate whether the statement is true or false

Computer Science & Information Technology

List the three components that the ICA uses.

What will be an ideal response?

Computer Science & Information Technology