What is the Chain of Custody?
Answer / chaitanya
When keeping track of data or equipment for use in legal proceedings, it needs to remain in a pristine state. Therefore, documenting exactly who has had access to what for how long is vital when dealing with this situation. Any compromise in the data can lead to legal issues for the parties involved and can lead to a mistrial or contempt depending on the scenario.
| Is This Answer Correct ? | 0 Yes | 0 No |
What is XSS?
What is the CIA triangle?
You find out that there is an active problem on your network. You can fix it, but it is out of your jurisdiction. What do you do?
On a Windows network, why is it easier to break into a local account than an AD account?
What’s the difference between a White Box test and a Black Box test?
What is meant by computer application?
What is a driver in computer?
What is data protection in transit vs data protection at rest?
What are the most common computer applications?
How do you protect your home Wireless Access Point?
What is an easy way to configure a network to allow only a single computer to login on a particular jack?
What are salted hashes?