In which step of the computer forensics investigation methodology would you run MD5 checksum on the evidence?
A . Obtain search warrant
B . Evaluate and secure the scene
C . Collect the evidence
D . Acquire the data
Answer: D
In which step of the computer forensics investigation methodology would you run MD5 checksum on the evidence?
A . Obtain search warrant
B . Evaluate and secure the scene
C . Collect the evidence
D . Acquire the data
Answer: D