Which of the following BEST describes the process of documenting everyone who has physical access or possession of evidence
A. Legal hold
B. Chain of custody
C. Secure copy protocol
D. Financial responsibility
Answer: B. Chain of custody
Computer Science & Information Technology
You might also like to view...
To modify a sequential file, a(n) __________ file temporarily stores the contents of the given file while it is being modified.
Fill in the blank(s) with correct word
Computer Science & Information Technology
The ____ is command central for formatting type in Photoshop.
A. Type panel B. Setting panel C. Character panel D. Character Tools panel
Computer Science & Information Technology
When sorting the Properties in alphabetical order in the Properties window, what entry is not in alphabetical order?
A. Text B. Size C. Name D. BackColor
Computer Science & Information Technology
What are roles and how are they used in database security and permissions? Provide an example of a predefine server role.
What will be an ideal response?
Computer Science & Information Technology