Which of the following should a computer forensics lab used for investigations have?
A.
isolation
B.
restricted access
C.
open access
D.
an entry log
Which of the following should a computer forensics lab used for investigations have?
Which of the following should a computer forensics lab used for investigations have?
A.
isolation
B.
restricted access
C.
open access
D.
an entry log