In a computer forensics investigation, ________ describes the route that evidence takes from the time you find it until the case is closed or goes to court.

A. Policy of separation
B. Rules of evidence
C. Law of probability
D. Chain of custody


Answer: D. Chain of custody

Computer Science & Information Technology

You might also like to view...

When you type in a command to your shell, it uses a particular variable to ascertain where to look for that command. What is it, and what happens if it's set to NULL?

What will be an ideal response?

Computer Science & Information Technology

After creating two variables as follows:char message1[81] = "this is a string";char *message2 = "this is a string";The statement ____ is not valid in C.

A. message1 = "A new message"; B. message2 = "A new message"; C. message2 = message1; D. message2[0] = 'T';

Computer Science & Information Technology

The service within Kerberos that generates and issues session keys is known as __________.

A. VPN B. KDC C. AS D. TGS

Computer Science & Information Technology

A(n) ______ is a private combination of characters associated with the user name that allows access to certain computer, mobile device, or network resources.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology