Which method is most effective for validating the data integrity of a suspect's hard drive during an incident response investigation?
Computing and comparing MD5 or SHA-256 hash values
Checking file timestamps
Calculating checksums
Using file size comparisons