Which of the following should a computer forensics lab used for investigations have?
isolation
restricted access
open access
an entry log
Submit