A compromised system was given to your IT administrator for storage until police can investigate
the system further. Which of the following will police and other legal personnel expect from the IT
administrator in order for this system to be considered valid evidence?
A.
A chain of custody
B.
A parked hard drive
C.
A mirrored hard drive
D.
A summary of events
Explanation: