Which of the following is a documentation of guidelines that computer forensics experts use to
handle evidences?
A.
Incident response policy
B.
Chain of custody
C.
Chain of evidence
D.
Evidence access policy
Which of the following is a documentation of guidelines that computer forensics experts use to
handle evidences?
Which of the following is a documentation of guidelines that computer forensics experts use to
handle evidences?
A.
Incident response policy
B.
Chain of custody
C.
Chain of evidence
D.
Evidence access policy