Evidence should be tracked utilizing which of the following methods?

A. Evidence recovery tag
B. Investigators evidence notebook
C. Record of evidence
D. Chain of custody


Answer: D. Chain of custody

Computer Science & Information Technology

You might also like to view...

Superscripts are assigned by the computer when an array is created in internal memory.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The most common file format for editing sound on the Macintosh is ____________________. The audio file format introduced by Microsoft and IBM with the introduction of Windows is the ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

If you want to remove the AutoCorrect Options button from the screen, you can press the ____ key.

A. ESC B. F5 C. CTRL D. SHIFT

Computer Science & Information Technology

A network administrator would MOST likely use a port scanner to do which of the following?

A. Capture incoming network packets to port 80 on a workstation. B. Trace a physical network port through a building. C. Remotely test a firewall configuration on a server. D. Report the link speed and duplex of all ports on a switch

Computer Science & Information Technology