Collecting Evidence In Response To A Security Incident What should be created when collecting evidence in response to a security incident?Chain of custody