A(n) ____ helps you document what has and has not been done with both the original evidence and forensic copies of the evidence.
a. evidence custody form
b. risk assessment form
c. initial investigation form
d. evidence handling form
ANSWER: a
Computer Science & Information Technology
You might also like to view...
________ is representing information with symbols.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Cell ________ are the amount of space between a cell's content and the borders of the cell
A) styles B) margins C) paddings D) spacings
Computer Science & Information Technology
A ____ attack takes each word from a dictionary and encodes it in the same way the passphrase was encoded.
A. social engineering B. brute force C. dictionary D. birthday
Computer Science & Information Technology
Which statement about C arithmetic is false?
a) 6 / 3 yields 2 b) 5 / 2 yields 2.5 c) 7 % 3 yields 1 d) 6 % 3 yields 0
Computer Science & Information Technology