exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 183 discussion

Actual exam question from CompTIA's SY0-601
Question #: 183
Topic #: 1
[All SY0-601 Questions]

Which of the following BEST describes the process of documenting who has access to evidence?

  • A. Order of volatility
  • B. Chain of custody
  • C. Non-repudiation
  • D. Admissibility
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
rodwave
Highly Voted 2 years, 7 months ago
Selected Answer: B
Answer: Chain of custody A chain of custody is a chronological paper trail documenting when, how, and by whom individual items of physical or electronic evidence—such as cell phone logs—were collected, handled, analyzed, or otherwise controlled during an investigation. ======================== Helpful info Order of Volatility -the sequence or order in which the digital evidence is collected. The order is maintained from highly volatile to less volatile data. Highly volatile data resides in the memory, cache, or CPU registers, and it will be lost as soon as the power to the computer is turned off. Non-repudiation - the assurance that the sender of information is provided with proof of delivery and the recipient is provided with proof of the sender's identity, so neither can later deny having processed the information. Admissibility - the quality of being acceptable or valid, especially as evidence in a court of law.
upvoted 13 times
...
ImBleghk
Most Recent 1 year, 6 months ago
Selected Answer: B
B. Chain of custody
upvoted 1 times
...
ApplebeesWaiter1122
1 year, 11 months ago
Selected Answer: B
The process of documenting who has access to evidence and maintaining a record of its movement and handling is known as the chain of custody. It is a crucial process in digital forensics and legal investigations to ensure the integrity and admissibility of the evidence in a court of law. By documenting the chain of custody, investigators can establish that the evidence has not been tampered with and that it can be trusted as valid and reliable.
upvoted 1 times
...
Real_Fake_doors
2 years, 4 months ago
Selected Answer: B
Chain of custody is the obvious answer, but the wording is so dumb on some of these. Access is not the same as possession.
upvoted 3 times
...
Knowledge33
2 years, 8 months ago
Selected Answer: B
I think all responses are not correct, but the least false is reponse C (Chain of custody). The chain of custody is not limited to tell who has access to why. It describes many things such as who had access, when, why, and so on. It's used for forensic investigation. The other responses are totally false.
upvoted 1 times
...
RonWonkers
2 years, 9 months ago
Selected Answer: B
Chain of custody, B
upvoted 4 times
...
gen2dee
2 years, 9 months ago
Chain of custody
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...