EC-Council: Computer Hacking Forensic Investigator(CHFI-V10) |
||||
Module 2 : Computer Forensics Investigation Process |
||||
Questions available : 60 |
You are not logged in. Please Login for track your learning progress |
|||
Go to Question No. |
Question No 0
If you want to share the link of this question, please click here to "Copy Question Link" and share that generated link. Link from URL may change in future.
Comunity Comments:

Opted Answer: B
The best practice in forensic investigations is to make at least two bit-stream copies of a suspect drive.
This ensures that one copy remains untouched as the master evidence, while the other is used for analysis.
Creating multiple copies helps preserve the integrity of the original data and allows investigators to verify findings across different forensic tools