In which step of the computer forensics investigation methodology would you run MD5 checksum on the evidence?

In which step of the computer forensics investigation methodology would you run MD5 checksum on the evidence?
A . Obtain search warrant
B . Evaluate and secure the scene
C . Collect the evidence
D . Acquire the data

Answer: D

Latest 312-49v9 Dumps Valid Version with 547 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments