If you plan to startup a suspect’s computer, you must modify the ___________ to ensure that you do not
contaminate or alter data on the suspect’s hard drive by booting to the hard drive.
A.
deltree command
B.
CMOS
C.
Boot.sys
D.
Scandisk utility
If you plan to startup a suspect’s computer, you must modify the ___________ to ensure that you do not
contaminate or alter data on the suspect’s hard drive by booting to the hard drive.
If you plan to startup a suspect’s computer, you must modify the ___________ to ensure that you do not
contaminate or alter data on the suspect’s hard drive by booting to the hard drive.
A.
deltree command
B.
CMOS
C.
Boot.sys
D.
Scandisk utility