The process of safekeeping and recordkeeping of computer forensics evidence is known as:
a. Chain of custody
b. Chain of evidence
c. Burden of proof
d. Best evidence rule
The statement that defines principles of behavior for Internet usage is:
a. Computer Fraud and Abuse Act
b. (ISC)2Code of Ethics
c. RFC 1087: Ethics and the Internet
d. Computer Misuse Act
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here