Documentation of every person who had access to evidence, how they interacted with it, and where it was stored is called the ________________

a. Forensic trail
b. Chain of custody
c. Audit trail
d. None of the above


Answer B.

Computer Science & Information Technology

You might also like to view...

What are the limitations of creating a CIDR address?

What will be an ideal response?

Computer Science & Information Technology

A(n) ___________ is a group of related, named constants.

a) namespace b) variable c) enumeration d) None of the above.

Computer Science & Information Technology

A PivotChart has live updates as you change the PivotTable

Indicate whether the statement is true or false

Computer Science & Information Technology

The event list is displayed by default when the _________ window opens.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology