Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

ECCouncil Computer Hacking Forensic Investigator (CHFIv11) 312-49v11 Question # 114 Topic 12 Discussion

ECCouncil Computer Hacking Forensic Investigator (CHFIv11) 312-49v11 Question # 114 Topic 12 Discussion

312-49v11 Exam Topic 12 Question 114 Discussion:
Question #: 114
Topic #: 12

A digital forensics investigator is tasked with analyzing a compromised Mac computer recovered from a cybercrime scene. However, upon examination, the investigator discovers that the log messages containing crucial evidence have been tampered with or deleted.

Given the tampering or deletion of log messages on the Mac computer, which anti-forensic technique is likely employed to hinder the forensic analysis process in this scenario?


A.

Data encryption


B.

Data obfuscation


C.

Data hiding


D.

Data manipulation


Get Premium 312-49v11 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.