Computer forensics experts use specific guidelines to gather and analyze data while minimizing
data loss.
What guidelines do they use?
A.
Chain of custody
B.
Chain of command
C.
Evidence
D.
Incident response
Explanation:
The chain of custody is a log of the history of evidence that has been collected. This log should
catalog every event from the time the evidence is collected.
Reference:
Mike Pastore and Emmett Dulaney , Security+ Study Guide , 2nd Edition, Alameda , Sybex , 2004,
p 457