Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

ECCouncil Computer Hacking Forensic Investigator (CHFIv11) 312-49v11 Question # 115 Topic 12 Discussion

ECCouncil Computer Hacking Forensic Investigator (CHFIv11) 312-49v11 Question # 115 Topic 12 Discussion

312-49v11 Exam Topic 12 Question 115 Discussion:
Question #: 115
Topic #: 12

Tom, a digital forensics investigator, is assigned to investigate a potential insider threat at a company. He arrives at the scene to find that a workstation has been compromised. The suspect, a former employee, allegedly used a malicious USB device to access sensitive files before being caught. Tom quickly begins his investigation, and after isolating the workstation from the network, he powers up the system in a controlled environment. His first task is to collect data stored in the system ' s memory, including active processes, network connections, and clipboard content. Tom knows that this type of data can provide critical information about the actions of the suspect during the time of the attack. Why is Tom prioritizing this data over other types of evidence in this case?


A.

Volatile data provide the most stable evidence.


B.

Volatile data is time-sensitive and can be lost once the system is powered off.


C.

Non-volatile data is most relevant to the case.


D.

Non-volatile data is easier to recover than volatile data.


Get Premium 312-49v11 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.