A detailed chain of custody report forms part of ________ specific documentation
Fill in the blank(s) with the appropriate word(s).
Answer: non-computer-
You might also like to view...
What is the output of the following code?
int x = 0; if (x < 4) { x = x + 1; } System.out.println("x is " + x); a. x is 0 b. x is 1 c. x is 2 d. x is 3 e. x is 4
Answer the following statements true (T) or false (F)
1. Malicious software aims to trick users into revealing sensitive personal data. 2. Keyware captures keystrokes on a compromised system. 3. Metamorphic code is software that can be shipped unchanged to a heterogeneous collection of platforms and execute with identical semantics. 4. A virus that attaches to an executable program can do anything that the program is permitted to do. 5. It is not possible to spread a virus via a USB stick