CompTIA A+ Question F-63

After a system was hacked by an outsider, a technician is dispatched to the system. The technician records the location of the system on a log and then signs the system over to a tier-two technician. The tier-two technician analyzes the system and then signs it over to the case manager. Which of the following is this an example of?

A. Evidence preservation
B. Process documentation
C. Due process
D. Chain of custody

Correct Answer: D

Explanation:
http://en.wikipedia.org/wiki/Chain_of_custody