Documentation of every person who had access to evidence, how they interacted with it, and where it was stored is called the ________________
a. Forensic trail
b. Chain of custody
c. Audit trail
d. None of the above
Answer B.
Computer Science & Information Technology
You might also like to view...
What are the limitations of creating a CIDR address?
What will be an ideal response?
Computer Science & Information Technology
A(n) ___________ is a group of related, named constants.
a) namespace b) variable c) enumeration d) None of the above.
Computer Science & Information Technology
A PivotChart has live updates as you change the PivotTable
Indicate whether the statement is true or false
Computer Science & Information Technology
The event list is displayed by default when the _________ window opens.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology