Transcript text: During an investigation into a cybersecurity incident, what steps should the organization take to ensure that host devices and media taken from the crime scene are properly labeled, bagged, and sealed?
A. Label the devices and media with a permanent marker, place them in a plastic bag, and seal them with duct tape
B. Label the devices and media with tamper-evident, antistatic shielding bags, and record evidence collection details on a chain of custody form
C. Place the devices and media in a cardboard box, seal it with masking tape, and store it in a locked cabinet
D. Label the devices and media with a ballpoint pen, place them in a manila envelope, and seal them with staples