Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

ECCouncil Computer Hacking Forensic Investigator (CHFIv11) 312-49v11 Question # 77 Topic 8 Discussion

ECCouncil Computer Hacking Forensic Investigator (CHFIv11) 312-49v11 Question # 77 Topic 8 Discussion

312-49v11 Exam Topic 8 Question 77 Discussion:
Question #: 77
Topic #: 8

Jenny, a CHFI specialist, is assigned to a case involving potential corporate fraud within a major banking institution. A whistleblower from the bank has leaked terabytes of data online, which Jenny must examine for evidence. The sheer volume of the data, combined with the requirement to maintain the chain of custody and ensure that her findings can be used in court, makes her task quite daunting. Jenny knows that using the wrong approach could jeopardize the case, so she must choose her initial steps carefully. What should Jenny ' s strategy be to effectively deal with this mountain of digital evidence?


A.

Start examining the leaked data directly from the source of the leak


B.

Prioritize the leaked data based on the whistleblower ' s information, and conduct a selective examination


C.

Create hash values for all leaked files before the examination to maintain data integrity and chain of custody


D.

Download the leaked data and distribute it among her team for parallel analysis


Get Premium 312-49v11 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.