What is the Chain of Custody?
Answer / chaitanya
When keeping track of data or equipment for use in legal proceedings, it needs to remain in a pristine state. Therefore, documenting exactly who has had access to what for how long is vital when dealing with this situation. Any compromise in the data can lead to legal issues for the parties involved and can lead to a mistrial or contempt depending on the scenario.
Is This Answer Correct ? | 0 Yes | 0 No |
What is the CIA triangle?
What is SSL and why is it not enough when it comes to encryption?
Why is deleted data not truly gone when you delete it?
What is the Three-way handshake? How can it be used to create a DOS attack?
What are the three ways to authenticate a person?
What is an easy way to configure a network to allow only a single computer to login on a particular jack?
What is XSS?
Why would you want to use SSH from a Windows pc?
How would you login to Active Directory from a Linux or Mac box?
You see a user logging in as root to perform basic functions. Is this a problem?
What is data source in computer?
How would you permanently remove the threat of data falling into the wrong hands?