Which of the following is a documentation of guidelines that computer forensics experts use to handle evidences?
A . Chain of custody
B . Evidence access policy
C . Chain of evidence
D . Incident response policy
Answer: A
Which of the following is a documentation of guidelines that computer forensics experts use to handle evidences?
A . Chain of custody
B . Evidence access policy
C . Chain of evidence
D . Incident response policy
Answer: A