Which of the following BEST describes the process of documenting everyone who has physical access or possession of evidence

A. Legal hold
B. Chain of custody
C. Secure copy protocol
D. Financial responsibility


Answer: B. Chain of custody

Computer Science & Information Technology

You might also like to view...

To modify a sequential file, a(n) __________ file temporarily stores the contents of the given file while it is being modified.

Fill in the blank(s) with correct word

Computer Science & Information Technology

The ____ is command central for formatting type in Photoshop.

A. Type panel B. Setting panel C. Character panel D. Character Tools panel

Computer Science & Information Technology

When sorting the Properties in alphabetical order in the Properties window, what entry is not in alphabetical order?

A. Text B. Size C. Name D. BackColor

Computer Science & Information Technology

What are roles and how are they used in database security and permissions?  Provide an example of a predefine server role.

What will be an ideal response?

Computer Science & Information Technology