In forensic procedures, a chronological record outlining persons in possession of an evidence is referred to as:

  • Access log
  • Chain of custody
  • Proxy list
  • Order of volatility

CompTIA Network+ N10-006
  • Network Architecture
  • Network operations
  • Network security
  • Troubleshooting
  • Industry standards, practices, and network theory
    • This question is filed here