EC-Council: Computer Hacking Forensic Investigator(CHFI-V10) |
||||
Module 2 : Computer Forensics Investigation Process |
||||
Questions available : 60 |
You are not logged in. Please Login for track your learning progress |
|||
Go to Question No. |
Question No 0
If you want to share the link of this question, please click here to "Copy Question Link" and share that generated link. Link from URL may change in future.
Comunity Comments:

Opted Answer: A
A Chain of Custody document is crucial in forensic investigations as it ensures the integrity and authenticity of collected evidence. It tracks:
Forensic processes applied to the evidence.
Individuals handling the evidence at different stages.
Dates and times when the evidence is accessed or transferred.
Storage locations where the evidence is kept.
Maintaining a proper Chain of Custody prevents tampering and ensures that evidence remains admissible in legal proceedings.

Opted Answer: D
Chain of Custody captures physical details of items seized and its handlers. It shall not capture processes applied