What is the Chain of Custody?
Answer / chaitanya
When keeping track of data or equipment for use in legal proceedings, it needs to remain in a pristine state. Therefore, documenting exactly who has had access to what for how long is vital when dealing with this situation. Any compromise in the data can lead to legal issues for the parties involved and can lead to a mistrial or contempt depending on the scenario.
Is This Answer Correct ? | 0 Yes | 0 No |
Does indexing slow down computer?
What is a spooler on a computer?
What is an easy way to configure a network to allow only a single computer to login on a particular jack?
If you were going to break into a database-based website, how would you do it?
What is the difference between an HIDS and a NIDS?
What is your opinion on hacktivist groups such as Anonymous?
What’s the difference between Symmetric and Asymmetric encryption?
What is the difference between a virus and a trojan?
0 Answers Tavant Technologies, Zensar,
What are the three ways to authenticate a person?
Why are internal threats oftentimes more successful than external threats?
What is meant by computer application?
What is the CIA triangle?