CompTIA Exam Questions

Which of the following is this an example of?

After a system was hacked by an outsider, a technician is dispatched to the system. The
technician records the location of the system on a log and then signs the system over to a tier-two
technician. The tier-two technician analyzes the system and then signs it over to the case
manager. Which of the following is this an example of?

A.
Evidence preservation

B.
Process documentation

C.
Due process

D.
Chain of custody

Explanation:

http://en.wikipedia.org/wiki/Chain_of_custody