Which of the following should be an information security manager's MOST important concern to ensure admissibility of information security evidence from cyber crimes?
A. Chain of custody
B. Tools used for evidence analysis
C. Forensics contractors
D. Efficiency of the forensics team
A. Chain of custody
B. Tools used for evidence analysis
C. Forensics contractors
D. Efficiency of the forensics team