Match the following investigative objectives to their proper chain of custody practices
I. Document the activities A. Verify the integrity of the copy to the source
II. Authenticate the copy B. Ensure fairness in the evaluation
III. Acquire the evidence C. Create a copy without altering the original
IV. Be objective and unbiased D. Keep detailed records and photographs
V. Analyze and filter the evidence E. Perform the technical analysis while
retaining its integrity
D A C B E
Computer Science & Information Technology
You might also like to view...
The Report and Group Headers are printed at the top of every page of the report
Indicate whether the statement is true or false
Computer Science & Information Technology
What is the purpose of using shapes in a presentation?
What will be an ideal response?
Computer Science & Information Technology