You are working with digital evidence of criminal activity. What is the most important protocol in this situation?

  • Chain of custody
  • Channel Escalation
  • Encryption of data protocol
  • Change control management

Your Score:
PC Hardware
Networking
Laptops
Printers
Operational Procedures
CompTIA A+ 220-801
  • PC Hardware
  • Networking
  • Laptops
  • Printers
  • Operational Procedures
    • This question is filed here