In principle, the ____________________ is quite simple; basically, it is a legal record of where the evidence was at each point in its lifetime as well as documentation of each and every access there was to it.

Fill in the blank(s) with the appropriate word(s).

chain of custody

Computer Science & Information Technology

You might also like to view...

Which of the following would allow a test of what would occur if a hacker were able to circumvent a limit imposed by the browser?

A. fuzzers B. HTTP interceptors C. white boxes D. password crackers

Computer Science & Information Technology

It is _________ to pass an argument to a function that contains an individual array element, such as scores[3].

a. illegal in C++11 b. legal in C++ c. not recommended by the ANSI committee d. not good programming practice e. None of these

Computer Science & Information Technology