Explain the usual process for maintaining a chain of custody.
What will be an ideal response?
The usual process is that the field investigator maintains personal custody and control of the sealed item until it is logged into the chain of custody log at the evidence storage room. Each time the item is removed (for analysis, copying, etc.), it is logged out, forming a documented trail of who accessed the information and when that access occurred.
You might also like to view...
Which of the following Linux commands can be used for block file copy and for hard disk backup and restore?
a. rdiff b. dd c. pwd d. xcopy
Identify the following statements which will: Format a string to contain the word “Name” in a column of 20 characters wide, followed by the word “Address” in a second column, also 20 characters wide.
a. String.Format(“{0, 20}{1, 20}”, “Name”, “Address”) b. String.Format(“{ 20}{ 20}”, “Name”, “Address”) c. String.Format(20, 20, “Name”, “Address”) d. String.Format(20, 40, “Name”, “Address”)