Jacob has discovered what he believes is a crime on a computer that he is servicing. Jacob has identified and gone through the proper channels to report the incident. He has created a backup of the entire hard drive to preserve the evidence and has started to document the evidence.
?
What must Jacob maintain so the evidence can be used to prosecute the crime?
A. Incident documentation
B. Chain of custody
C. A backup of the data
D. Private property laws
Answer: B
Computer Science & Information Technology
You might also like to view...
In a form of repetition called ____-trip behavior, a group of statements within a loop is performed zero or more times.
A. zero B. iterative C. cyclical D. round
Computer Science & Information Technology
Computers in a peer-to-peer network belong to a ________
a.client-server group b.domain c.personal area network d.workgroup
Computer Science & Information Technology
An example of a microblogging site is ________
A) Pinterest B) Tumblr C) MySpace D) Facebook
Computer Science & Information Technology
Most monitors have a graphics display, which divides the screen into a matrix of small dots called ____________________.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology