Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

ECCouncil EC Council Certified Incident Handler (ECIH v3) 212-89 Question # 46 Topic 5 Discussion

ECCouncil EC Council Certified Incident Handler (ECIH v3) 212-89 Question # 46 Topic 5 Discussion

212-89 Exam Topic 5 Question 46 Discussion:
Question #: 46
Topic #: 5

A regional healthcare provider leveraging a platform-as-a-service (PaaS) cloud model detects suspicious activity involving unauthorized access to patient records. During the investigation, the incident response team attempts to retrieve system logs from virtual machines used during the breach. However, they realize that crucial log files are unavailable, as the short-lived instances were automatically terminated shortly after the event. This hampers their ability to reconstruct a complete activity trail and trace the attacker's movements. Which core cloud forensic challenge does this situation most likely reflect?


A.

Limited log access from containerized workloads.


B.

Metadata misalignment resulting from inconsistent log normalization.


C.

Evaporation of logs due to volatile storage.


D.

Log encryption hindered by poor key management practices.


Get Premium 212-89 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.