312-49v10 Exam QuestionsBrowse all questions from this exam

312-49v10 Exam - Question 532


During a computer hacking forensic investigation, an investigator is tasked with acquiring volatile data from a live Linux system with limited physical access. Which methodology would be the most suitable for this scenario?

Show Answer
Correct Answer: B

Given the scenario of a live Linux system with limited physical access, performing remote acquisition of volatile data using dd and netcat would be the most suitable methodology. This approach leverages common Linux utilities to transfer the data over the network, allowing the investigator to capture the volatile data without needing direct physical access to the machine.

Discussion

1 comment
Sign in to comment
ElbOption: B
May 29, 2024

Acquire Volatile Data from a Windows Machine ( Windows based ) Acquire Volatile Data from a Linux Machine Using dd (Linux Local Acquisition) Acquire Volatile Data from a Linux Machine Using dd and Netcat (Linux Remote Acquisition) Acquire Volatile Data from a Linux Machine Using LiME (Linux Local Acquisition)