312-49v10 Exam QuestionsBrowse all questions from this exam

312-49v10 Exam - Question 490


In a situation where an investigator needs to acquire volatile data from a live Linux system, the physical access to the suspect machine is either restricted or unavailable. Which of the following steps will be the most suitable approach to perform this task?

Show Answer
Correct Answer: B

In a scenario where an investigator needs to obtain volatile data from a live Linux system remotely, using 'netcat' in combination with the 'dd' command is a suitable approach. The investigator can initiate a listening session on the forensic workstation using 'netcat' and then execute the 'dd' command on the suspect machine. The output can be piped through 'netcat' to transfer the RAM image to the forensic workstation. This method is effective for remote acquisition of volatile data and does not require physical access to the suspect machine.

Discussion

1 comment
Sign in to comment
ElbOption: D
May 28, 2024

To acquire RAM remotely over a network, the investigator must start a listening session on a suspect machine using tcp:port Command: insmod lime-<kernel_module>.ko “path=tcp:<port> format=lime” On the forensics workstation, the investigator should establish connection with the suspect machine using netcat and dump RAM data over the network Command: nc <IP Address of the Suspect Machine>:<port> > filename.mem