In a computer forensics investigation, ________ describes the route that evidence takes from the time you find it until the case is closed or goes to court.
A. Policy of separation
B. Rules of evidence
C. Law of probability
D. Chain of custody
Answer: D. Chain of custody
You might also like to view...
When you type in a command to your shell, it uses a particular variable to ascertain where to look for that command. What is it, and what happens if it's set to NULL?
What will be an ideal response?
After creating two variables as follows:char message1[81] = "this is a string";char *message2 = "this is a string";The statement ____ is not valid in C.
A. message1 = "A new message"; B. message2 = "A new message"; C. message2 = message1; D. message2[0] = 'T';
The service within Kerberos that generates and issues session keys is known as __________.
A. VPN B. KDC C. AS D. TGS
A(n) ______ is a private combination of characters associated with the user name that allows access to certain computer, mobile device, or network resources.
Fill in the blank(s) with the appropriate word(s).