What is the Chain of Custody?
Answer / chaitanya
When keeping track of data or equipment for use in legal proceedings, it needs to remain in a pristine state. Therefore, documenting exactly who has had access to what for how long is vital when dealing with this situation. Any compromise in the data can lead to legal issues for the parties involved and can lead to a mistrial or contempt depending on the scenario.
| Is This Answer Correct ? | 0 Yes | 0 No |
What is data source in computer?
What is a spooler on a computer?
You are an employee for a tech department in a non-management position. A high-level executive demands that you break protocol and allow him to use his home laptop at work. What do you do?
How do you protect your home Wireless Access Point?
What is data protection in transit vs data protection at rest?
What is the Three-way handshake? How can it be used to create a DOS attack?
What is a driver in computer?
How would you login to Active Directory from a Linux or Mac box?
I run an SMB. I have 4 people in my entire company and a web-based store. I don’t have the time, patience or manpower to have a computer guy. Why should I care about exploits and computer jibberish?
What is the CIA triangle?
What is residual risk?
You see a user logging in as root to perform basic functions. Is this a problem?