Jacob has discovered what he believes is a crime on a computer that he is servicing. Jacob has identified and gone through the proper channels to report the incident. He has created a backup of the entire hard drive to preserve the evidence and has started to document the evidence.
?
What must Jacob maintain so the evidence can be used to prosecute the crime?
A. Incident documentation
B. Chain of custody
C. A backup of the data
D. Private property laws
Answer: B
You might also like to view...
A(n) ____ is an example of a secondary memory device.
A. register B. RAM chip C. USB flash drive D. virtual disk
Write a function that counts all the characters and the vowels in a string the user inputs. Then write a routine that calls the function and displays the following output.
$ ./count_all.py Enter some words: The sun rises in the East and sets in the West. 13 letters in 47 are vowels.
Relationships are formed between forms based on common fields
Indicate whether the statement is true or false
Which of the following is not a suggested deployment strategy for Windows 7?
a. High-Touch with Retail Media b. High-Touch with Standard Image c. Lite-Touch, High-Volume Deployment d. Lite-Touch, Low-Volume Deployment