The ______________________ of evidence supports the integrity of your evidence.

Fill in the blank(s) with the appropriate word(s).


chain of custody

Computer Science & Information Technology

You might also like to view...

Match each term below with the statement that best defines it.

A. Used to run a macro B. Provides consistent descriptive text as you navigate records C. Displays choices for a field D. Used to provide a list of possible data entries E. Creates a three-dimensional aspect on a form F. Used to provide a list of options for a field plus the ability for the user to enter a new value G. Best choice to display a field such as Veteran that has only two options, Yes or No H. Used to visually separate information on a form

Computer Science & Information Technology

What term best describes any IP address or IP address range that has not been assigned to an IP address block?

A. Reserved address space B. Unmapped address space C. Mapped address space D. Blocked address space

Computer Science & Information Technology

A company has asked the network administrator to restrict access to any websites with unauthorized material. Which of the following technologies would BEST accomplish this?

A. Content filter B. Packet filter C. IPS D. IDS

Computer Science & Information Technology

Two small companies sharing a switch would MOST likely benefit from which of the following advanced switch features?

A. Spanning tree B. Trunking C. PoE D. VLAN

Computer Science & Information Technology