List of questions
Related questions
Question 16 - ECSS discussion
John, a forensic officer, was working on a criminal case. He employed imaging software to create a copy of data from the suspect device on a storage medium for further investigation. For developing an image of the original data, John used a software application that does not allow an unauthorized user to alter the image content on storage media, thereby retaining an unaltered image copy.
Identify the data acquisition step performed by John in the above scenario.
A.
Validated data acquisition
B.
Planned for contingency
C.
Sanitized the target media
D.
Enabled write protection on the evidence media
Your answer:
0 comments
Sorted by
Leave a comment first