You are working with digital evidence of criminal activity. What is the most important protocol in this situation?

  • Chain of custody
  • Change control management
  • Channel Escalation
  • Encryption of data protocol

Your Score:
PC Hardware
Networking
Laptops
Printers
Operational Procedures
CompTIA A+ 220-801
  • PC Hardware
  • Networking
  • Laptops
  • Printers
  • Operational Procedures
    • This question is filed here