Which of the following should be performed on a computer to protect the operating system from malicious software? (Select TWO).
Which of the following describes the purpose of chain of custody as applied to forensic image retention?
Which of the following would provide the MOST reliable proof that a datacenter was accessed at a certain time of day?