Which of the following are well-known methods that are used to protect evidence during the forensics process? (Choose three.)