which step of the computer forensics investigation methodology would you run MD5 checksum on the evidence?

In which step of the computer forensics investigation methodology would you run MD5 checksum
on the evidence?

In which step of the computer forensics investigation methodology would you run MD5 checksum
on the evidence?

A.
Acquire the data

B.
Collect the evidence

C.
Obtain search warrant

D.
Evaluate and secure the scene



Leave a Reply 0

Your email address will not be published. Required fields are marked *