Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

ECCouncil Computer Hacking Forensic Investigator (CHFIv11) 312-49v11 Question # 7 Topic 1 Discussion

ECCouncil Computer Hacking Forensic Investigator (CHFIv11) 312-49v11 Question # 7 Topic 1 Discussion

312-49v11 Exam Topic 1 Question 7 Discussion:
Question #: 7
Topic #: 1

James, a forensic investigator, is tasked with examining a suspect’s computer system that is believed to have been used for illegal activities. During his investigation, he finds multiple files with unusual extensions and encrypted contents. One of the files, in particular, appears to be a password-protected ZIP file. As part of his investigation, James needs to extract and analyze the contents of this file to check if it contains any evidence of criminal activity. What should James do next?


A.

Use a brute force tool to attempt to break the password


B.

Document the file’s existence and send it for decryption by a specialized service


C.

Immediately delete the file to prevent any tampering


D.

Open the file without using a password and extract the contents


Get Premium 312-49v11 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.