Which of the following best describes Chain of Evidence in the context of security forensics?
A.
Evidence is locked down, but not necessarily authenticated.
B.
Evidence is controlled and accounted for to maintain its authenticity and integrity.
C.
The general whereabouts of evidence is known.
D.
Someone knows where the evidence is and can say who had it if it is not logged.
Explanation: