A security analyst captures forensic evidence from a potentially compromised system for further investigation. The evidence is documented and securely stored to FIRST:
A. maintain the chain of custody.
B. preserve the data.
C. obtain a legal hol
d.
D. recover data at a later time.