EC-Council: Computer Hacking Forensic Investigator(CHFI-V10)
Module 2 : Computer Forensics Investigation Process
         
Questions available : 60 You are not logged in.
Please Login for track your learning progress
   
 
Q. No: 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 |
Go to Question No.



Question No 0


If you want to share the link of this question, please click here to "Copy Question Link" and share that generated link. Link from URL may change in future.
 

   
Bookmark this Question
QID: 225  
   
Williamson is a forensic investigator. While investigating a case of data breach at a company, he is maintaining a document that records details such as the forensic processes applied on the collected evidence, particulars of people handling it, the dates and times when it is being handled, and the place of storage of the evidence. What do you call this document?


 
A:    Chain of custody
 
B:    Authorization form
C:    Consent form
 
D:    Log book
 
         

 
 

Diffence opinion in Correct Answer or any comment?
Vote / Comment for correct Answer



Comunity Comments:

Banwari on 15/05/2025
Opted Answer: A
A Chain of Custody document is crucial in forensic investigations as it ensures the integrity and authenticity of collected evidence. It tracks:

Forensic processes applied to the evidence.

Individuals handling the evidence at different stages.

Dates and times when the evidence is accessed or transferred.

Storage locations where the evidence is kept.

Maintaining a proper Chain of Custody prevents tampering and ensures that evidence remains admissible in legal proceedings.

Deepti on 10/03/2025
Opted Answer: D
Chain of Custody captures physical details of items seized and its handlers. It shall not capture processes applied

















WELCOME TO ONLINE EXAM PREPARATION SYSTEM

Certification Examinations