In principle, the ____________________ is quite simple; basically, it is a legal record of where the evidence was at each point in its lifetime as well as documentation of each and every access there was to it.
Fill in the blank(s) with the appropriate word(s).
chain of custody
Computer Science & Information Technology
You might also like to view...
Which of the following would allow a test of what would occur if a hacker were able to circumvent a limit imposed by the browser?
A. fuzzers B. HTTP interceptors C. white boxes D. password crackers
Computer Science & Information Technology
It is _________ to pass an argument to a function that contains an individual array element, such as scores[3].
a. illegal in C++11 b. legal in C++ c. not recommended by the ANSI committee d. not good programming practice e. None of these
Computer Science & Information Technology