GIAC Certified Perimeter Protection Analyst GPPA Question # 5 Topic 1 Discussion

GIAC Certified Perimeter Protection Analyst GPPA Question # 5 Topic 1 Discussion

GPPA Exam Topic 1 Question 5 Discussion:
Question #: 5
Topic #: 1

Adam works as a professional Computer Hacking Forensic Investigator, a project has been assigned to him to investigate and examine files present on suspect's computer. Adam uses a tool with the help of which he can examine recovered deleted files, fragmented files, and other corrupted data. He can also examine the data, which was captured from the network, and access the physical RAM, and any processes running in virtual memory with the help of this tool.

Which of the following tools is Adam using?


A.

HxD


B.

Vedit


C.

WinHex


D.

Evidor


Get Premium GPPA Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.