Who is responsible for maintaining control of the field evidence log and locker?

A. Incident manager
B. Scribe
C. Imager
D. Forensic examiner

Answer: B

Computer Science & Information Technology

You might also like to view...

Three inclusion policies are found in contemporary cache systems: the inclusive policy, the __________ policy, and the noninclusive policy.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The PHP function _________ can stop users from maliciously (or otherwise) executing OS commands on your web server.

a. escapeshellcmd() b. exec() c. passthru() d. proc_close()

Computer Science & Information Technology