PrepAway - Latest Free Exam Questions & Answers

Which of the following is this an example of?

After a system was hacked by an outsider, a technician is dispatched to the system. The technician
records the location of the system on a log and then signs the system over to a tier-two technician.
The tier-two technician analyzes the system and then signs it over to the case manager. Which of the
following is this an example of?

PrepAway - Latest Free Exam Questions & Answers

A.
Evidence preservation

B.
Process documentation

C.
Due process

D.
Chain of custody


Leave a Reply