A(n) ____ helps you document what has and has not been done with both the original evidence and forensic copies of the evidence.

a. evidence custody form
b. risk assessment form
c. initial investigation form
d. evidence handling form


ANSWER: a

Computer Science & Information Technology

You might also like to view...

________ is representing information with symbols.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Cell ________ are the amount of space between a cell's content and the borders of the cell

A) styles B) margins C) paddings D) spacings

Computer Science & Information Technology

A ____ attack takes each word from a dictionary and encodes it in the same way the passphrase was encoded.

A. social engineering B. brute force C. dictionary D. birthday

Computer Science & Information Technology

Which statement about C arithmetic is false?

a) 6 / 3 yields 2 b) 5 / 2 yields 2.5 c) 7 % 3 yields 1 d) 6 % 3 yields 0

Computer Science & Information Technology