ECCouncil 412-79 Question Answer
Which of the following should a computer forensics lab used for investigations have?
isolation
restricted access
open access
an entry log
TESTED 18 Jan 2026
Copyright © 2014-2026 ACE4Sure. All Rights Reserved