Go back to 312-50 - Ethical Hacking and Countermeasures (CEHv6)

Question :-

Which is a standard procedure to perform during all computer forensics investigations?
with the hard drive removed from the suspect PC, check the date and time in the system's CMOS
with the hard drive in the suspect PC, check the date and time in the File Allocation Table
with the hard drive removed from the suspect PC, check the date and time in the system's RAM
with the hard drive in the suspect PC, check the date and time in the system's CMOS

Want to practice for 312-50 - Ethical Hacking and Countermeasures (CEHv6) ? Click here.