Jacob has discovered what he believes is a crime on a computer that he is servicing. Jacob has identified and gone through the proper channels to report the incident. He has created a backup of the entire hard drive to preserve the evidence and has started to document the evidence.
?
What must Jacob maintain so the evidence can be used to prosecute the crime?

A. Incident documentation
B. Chain of custody
C. A backup of the data
D. Private property laws


Answer: B

Computer Science & Information Technology

You might also like to view...

In a form of repetition called ____-trip behavior, a group of statements within a loop is performed zero or more times.

A. zero B. iterative C. cyclical D. round

Computer Science & Information Technology

Computers in a peer-to-peer network belong to a ________

a.client-server group b.domain c.personal area network d.workgroup

Computer Science & Information Technology

An example of a microblogging site is ________

A) Pinterest B) Tumblr C) MySpace D) Facebook

Computer Science & Information Technology

Most monitors have a graphics display, which divides the screen into a matrix of small dots called ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology