When compiling an incident report, which of the following would BEST serve as reliable evidence that is admissible in legal proceedings?
Chain of custody documents that detail how evidence was collected, handled, and preserved
Witness statements providing accounts of the security incident
Log files showing unauthorized access attempts
A forensic image hash to prove that the image of a system has not been altered