During which phase of an investigation do you make your first entries into a chain of custody log?

a. Examination
b. Acquisition
c. Identification/Assessment
d. Analysis
e. Reporting


b

Computer Science & Information Technology

You might also like to view...

To copy both character attributes and paragraph attributes, such as alignment and indentation, select the entire paragraph.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The administrator can use the ____ command to enable quotas on a specified file system.

A. grpquota B. usrquota C. quotaon D. quotacheck

Computer Science & Information Technology

Study the dollowing code: Dim myVal1 as Integer, myVal2, myVal3 as String The data type of the myVal2 variable is ______ Choose one answer.

a. Integer b. None of the others c. String d. Variant

Computer Science & Information Technology

Match each of the following terms with its best conceptual description:I.Nested FunctionII.ANDIII.ORIV.NOTV.IFA.False = trueB.At least one condition must be met for a true returnC.All conditions must be met for a true returnD.Tests conditions to process decisionsE.Use the results of one function as an argument in another

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology