PrepAway - Latest Free Exam Questions & Answers

Which of the following is this an example of?

After a system was hacked by an outsider, a technician is dispatched to the system. The
technician records the location of the system on a log and then signs the system over to a tier-two
technician. The tier-two technician analyzes the system and then signs it over to the case
manager. Which of the following is this an example of?

PrepAway - Latest Free Exam Questions & Answers

A.
Evidence preservation

B.
Process documentation

C.
Due process

D.
Chain of custody

Explanation:

http://en.wikipedia.org/wiki/Chain_of_custody


Leave a Reply