What term is used to describe a documentation of control over evidence, which is used to ensure that no unauthorized person was given the opportunity to corrupt the evidence?

A. chain of value
B. chain of use
C. chain of property
D. chain of custody


Answer: D

Computer Science & Information Technology

You might also like to view...

A variable is accessible to statements outside the form if declared __________.

a. as private and class-level b. as public c. as public and class-level d. with a Dim statement

Computer Science & Information Technology

The ___________ function returns the smallest integral value that is not less than the value passed to it.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

When you verify a system is functioning properly, you determine that the problem could have been prevented.   What should you do to help the computer’s user avoid having the same problem again?

A. Lock the user out of the problem area. B. Instruct the user on how to prevent the problem. C. Don’t tell the user anything so that he will have to call you back when the problem occurs again. D. Document the problem and hope the user reads your notes.

Computer Science & Information Technology

When handed to the NIC, each IP packet is enclosed in a regular ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology