During an investigation, a security analyst identified machines that are infected with malware the antivirus was unable to detect. Which of the following is the BEST place to acquire evidence to perform data carving?

A. The system memory
B. The hard drive
C. Network packets
D. The Windows Registry


Answer: A. The system memory

Computer Science & Information Technology

You might also like to view...

An association established between two tables based on common fields is called a(n) ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

If a report has multiple pages, the Layout view shows the report as one continuous layout without individual page headers or footers

Indicate whether the statement is true or false

Computer Science & Information Technology

The Template Gallery stores the templates for each program and opens by default when you open the program.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

____________________ is the act of confirming the identity of a potential user.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology