Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

ECCouncil Computer Hacking Forensic Investigator (CHFIv11) 312-49v11 Question # 27 Topic 3 Discussion

ECCouncil Computer Hacking Forensic Investigator (CHFIv11) 312-49v11 Question # 27 Topic 3 Discussion

312-49v11 Exam Topic 3 Question 27 Discussion:
Question #: 27
Topic #: 3

During a forensic investigation into a suspected data breach, the investigator discovers that the attacker has intentionally tampered with the digital storage media to erase evidence. Upon examination, the investigator finds that all addressable locations on the storage device have been replaced with arbitrary characters, making it impossible to recover the legitimate files that were originally stored on the drive, even with advanced forensic tools.

Which anti-forensic technique was used by the attacker in this case?


A.

The attacker uses encryption to protect the file data and prevent recovery.


B.

The attacker uses strong magnetic fields to erase file data without leaving recoverable traces.


C.

The attacker physically damages the device to ensure no file data can be recovered.


D.

The attacker uses irrelevant entries to substitute data in the files to inhibit recovery.


Get Premium 312-49v11 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.