During an incident response at a hospital in Chicago, Illinois, a suspect application server is still powered on with active user sessions. The team must prioritize capturing fragile, volatile information such as contents of RAM, cache, and dynamic process state that would be lost if the system shuts down. What type of acquisition approach best satisfies this requirement?
Submit