ECCouncil 412-79 Question Answer
Which of the following should a computer forensics lab used for investigations have?
isolation
restricted access
open access
an entry log
TESTED 07 Jul 2025
Copyright © 2014-2025 ACE4Sure. All Rights Reserved