Which of the following is this an example of?

After a system was hacked by an outsider, a technician is dispatched to the system. The technician
records the location of the system on a log and then signs the system over to a tier-two technician.
The tier-two technician analyzes the system and then signs it over to the case manager. Which of the
following is this an example of?

After a system was hacked by an outsider, a technician is dispatched to the system. The technician
records the location of the system on a log and then signs the system over to a tier-two technician.
The tier-two technician analyzes the system and then signs it over to the case manager. Which of the
following is this an example of?

A.
Evidence preservation

B.
Process documentation

C.
Due process

D.
Chain of custody



Leave a Reply 0

Your email address will not be published. Required fields are marked *