CompTIA Exam Questions

What is the term used to describe this process?

When evidence is acquired, a log is started that records who had possession of the evidence for a specific amount of time. This is to avoid allegations that the evidence may have been tampered with when it was unaccounted for, and to keep track of the tasks performed in acquiring evidence from a piece of equipment or materials. What is the term used to describe this process?

A.
Chain of command.

B.
Chain of custody.

C.
Chain of jurisdiction.

D.
Chain of evidence.

Explanation:
The chain of custody is a log of the history of evidence that has been collected. This log should catalog every event from the time the evidence is collected.
Reference: Security + (SYBEX) page 457