During an investigation, a security analyst identified machines that are infected with malware the antivirus was unable to detect. Which of the following is the BEST place to acquire evidence to perform data carving?
A. The system memory
B. The hard drive
C. Network packets
D. The Windows Registry
Answer: A. The system memory
Computer Science & Information Technology
You might also like to view...
An association established between two tables based on common fields is called a(n) ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
If a report has multiple pages, the Layout view shows the report as one continuous layout without individual page headers or footers
Indicate whether the statement is true or false
Computer Science & Information Technology
The Template Gallery stores the templates for each program and opens by default when you open the program.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
____________________ is the act of confirming the identity of a potential user.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology