Which of the following is a documentation of guidelines that computer forensics experts use to
handle evidences?
A.
Evidence access policy
B.
Incident responsepolicy
C.
Chain of custody
D.
Chain of evidence
Which of the following is a documentation of guidelines that computer forensics experts use to
handle evidences?
Which of the following is a documentation of guidelines that computer forensics experts use to
handle evidences?
A.
Evidence access policy
B.
Incident responsepolicy
C.
Chain of custody
D.
Chain of evidence