Proper collection of evidence and handling procedures must be followed to ensure the
evidence is ________.
Fill in the blank(s) with correct word
Question 2
Which are the most common places in a suspect computer where traces of evidence from Internet activity can be found?
What will be an ideal response?