Who is responsible for maintaining control of the field evidence log and locker?
A. Incident manager
B. Scribe
C. Imager
D. Forensic examiner
Answer: B
Computer Science & Information Technology
You might also like to view...
Three inclusion policies are found in contemporary cache systems: the inclusive policy, the __________ policy, and the noninclusive policy.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
The PHP function _________ can stop users from maliciously (or otherwise) executing OS commands on your web server.
a. escapeshellcmd() b. exec() c. passthru() d. proc_close()
Computer Science & Information Technology