CertNexus CyberSec First Responder (CFR) Exam CFR-410 Question # 19 Topic 2 Discussion

CertNexus CyberSec First Responder (CFR) Exam CFR-410 Question # 19 Topic 2 Discussion

CFR-410 Exam Topic 2 Question 19 Discussion:
Question #: 19
Topic #: 2

During the forensic analysis of a compromised computer image, the investigator found that critical files are missing, caches have been cleared, and the history and event log files are empty. According to this scenario, which of the following techniques is the suspect using?


A.

System hardening techniques


B.

System optimization techniques


C.

Defragmentation techniques


D.

Anti-forensic techniques


Get Premium CFR-410 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.