In which step of the computer forensics investigation methodology would you run MD5 checksum on the evidence?
A . Obtain search warrant
B . Evaluate and secure the scene
C . Collect the evidence
D . Acquire the data
Answer: D
Latest 312-49v9 Dumps Valid Version with 547 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund