0
0
Cybersecurityknowledge~10 mins

Chain of custody in Cybersecurity - Interactive Code Practice

Choose your learning style9 modes available
Practice - 5 Tasks
Answer the questions below
1fill in blank
easy

Complete the sentence to define chain of custody.

Cybersecurity
Chain of custody is the process of [1] and preserving evidence from collection to presentation in court.
Drag options to blanks, or click blank then click option'
Adestroying
Bignoring
Chiding
Dtracking
Attempts:
3 left
💡 Hint
Common Mistakes
Choosing words that imply neglect or damage to evidence.
2fill in blank
medium

Complete the sentence about documentation in chain of custody.

Cybersecurity
Every person who handles the evidence must [1] their actions in a log.
Drag options to blanks, or click blank then click option'
Aerase
Brecord
Cignore
Dhide
Attempts:
3 left
💡 Hint
Common Mistakes
Selecting options that suggest hiding or deleting information.
3fill in blank
hard

Fix the error in the statement about evidence handling.

Cybersecurity
If evidence is not [1], it may be considered invalid in court.
Drag options to blanks, or click blank then click option'
Asecured
Bcontaminated
Clost
Ddamaged
Attempts:
3 left
💡 Hint
Common Mistakes
Choosing words that describe problems rather than solutions.
4fill in blank
hard

Fill both blanks to complete the chain of custody record example.

Cybersecurity
Evidence was [1] by [2] at 10:00 AM on March 1st.
Drag options to blanks, or click blank then click option'
Acollected
BJohn
Cdestroyed
Dignored
Attempts:
3 left
💡 Hint
Common Mistakes
Using negative actions or ignoring the handler's identity.
5fill in blank
hard

Fill all three blanks to complete the chain of custody checklist.

Cybersecurity
The evidence must be [1], [2], and [3] at every step.
Drag options to blanks, or click blank then click option'
Asealed
Blogged
Cprotected
Ddiscarded
Attempts:
3 left
💡 Hint
Common Mistakes
Choosing 'discarded' which breaks the chain of custody.