Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

ECCouncil Computer Hacking Forensic Investigator (CHFIv11) 312-49v11 Question # 2 Topic 1 Discussion

ECCouncil Computer Hacking Forensic Investigator (CHFIv11) 312-49v11 Question # 2 Topic 1 Discussion

312-49v11 Exam Topic 1 Question 2 Discussion:
Question #: 2
Topic #: 1

During a malware investigation at a tech firm in Miami, forensic analysts suspect that the attacker attempted to conceal activity by removing traces of previously executed programs on the compromised workstation. What source of evidence would best allow investigators to reconstruct execution activity and attempts to remove traces of prior programs?


A.

Openfiles command output


B.

Clipboard contents


C.

Hash values


D.

Prefetch files


Get Premium 312-49v11 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.