Jacob has discovered what he believes is a crime on a computer that he is servicing. Jacob has identified and gone through the proper channels to report the incident. He has created a backup of the entire hard drive to preserve the evidence and has started to document the evidence.
?
What must Jacob maintain so the evidence can be used to prosecute the crime?

A. Incident documentation
B. Chain of custody
C. A backup of the data
D. Private property laws


Answer: B

Computer Science & Information Technology

You might also like to view...

A(n) ____ is an example of a secondary memory device.

A. register B. RAM chip C. USB flash drive D. virtual disk

Computer Science & Information Technology

Write a function that counts all the characters and the vowels in a string the user inputs. Then write a routine that calls the function and displays the following output.

$ ./count_all.py Enter some words: The sun rises in the East and sets in the West. 13 letters in 47 are vowels.

Computer Science & Information Technology

Relationships are formed between forms based on common fields

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following is not a suggested deployment strategy for Windows 7?

a. High-Touch with Retail Media b. High-Touch with Standard Image c. Lite-Touch, High-Volume Deployment d. Lite-Touch, Low-Volume Deployment

Computer Science & Information Technology