In forensic procedures, a chronological record outlining persons in possession of an evidence is referred to as:

  • Access log
  • Chain of custody
  • Order of volatility
  • Proxy list

Your Score:
Network Architecture
Network operations
Network security
Troubleshooting
Industry standards, practices, and network theory
CompTIA Network+ N10-006
  • Network Architecture
  • Network operations
  • Network security
  • Troubleshooting
  • Industry standards, practices, and network theory
    • This question is filed here