What is the most critical document of the computer forensic process to ensure that evidence is admissible in court?

A. Evidence collection sheet
B. Consent form
C. Search warrant
D. Chain of custody


Answer: D. Chain of custody

Computer Science & Information Technology

You might also like to view...

What Filestream property indicates whether the Filestream supports reading?

A. ReadAccess B. CanRead C. CanSeek D. ReadAccess

Computer Science & Information Technology

How long can third-party e-mail providers keep your e-mails?

A. 10 years B. Indefinitely C. 1 year D. 5 years

Computer Science & Information Technology

In the accompanying figure, the key symbol that appears in the row selector for the Business Analyst Number field indicates that Business Analyst Number is the ____ for the table.

A. principal key B. foreign key C. primary key D. main key

Computer Science & Information Technology

The following function definition has an error in it. What line is this error on?

0. void f1(const double array[], int size) 1. { 2. int i=0; 3. while(i< size) 4. { 5. array[i] += 2; 6. cout <

Computer Science & Information Technology