Which of the following statements is not a part of securing and evaluating electronic crime scene checklist?
Which of the following Operating System logs contains information about operational actions performed by OS components?