After a system was hacked by an outsider, a technician is dispatched to the system. The technician
records the location of the system on a log and then signs the system over to a tier-two technician.
The tier-two technician analyzes the system and then signs it over to the case manager. Which of the
following is this an example of?
A.
Evidence preservation
B.
Process documentation
C.
Due process
D.
Chain of custody