You are working with digital evidence of criminal activity. What is the most important protocol in this situation?

  • Chain of custody
  • Encryption of data protocol
  • Change control management
  • Channel Escalation

CompTIA A+ 220-801
  • PC Hardware
  • Networking
  • Laptops
  • Printers
  • Operational Procedures
    • This question is filed here