Computer forensics experts collect and analyze data using which of the following guidelines so as to minimize data loss?
A.
Evidence
B.
Chain of custody
C.
Chain of command
D.
Incident response
Explanation:
The chain of custody is a log of the history of evidence that has been collected. This log should catalog every event from the time the evidence is collected.
Reference: Security + (SYBEX) page 457