Match the following investigative objectives to their proper chain of custody practices

I. Document the activities A. Verify the integrity of the copy to the source
II. Authenticate the copy B. Ensure fairness in the evaluation
III. Acquire the evidence C. Create a copy without altering the original
IV. Be objective and unbiased D. Keep detailed records and photographs
V. Analyze and filter the evidence E. Perform the technical analysis while
retaining its integrity

D A C B E

Computer Science & Information Technology

You might also like to view...

The Report and Group Headers are printed at the top of every page of the report

Indicate whether the statement is true or false

Computer Science & Information Technology

What is the purpose of using shapes in a presentation?

What will be an ideal response?

Computer Science & Information Technology