exam questions

Exam 312-49v10 All Questions

View all questions & answers for the 312-49v10 exam

Exam 312-49v10 topic 1 question 740 discussion

Actual exam question from ECCouncil's 312-49v10
Question #: 740
Topic #: 1
[All 312-49v10 Questions]

In a situation where an investigator needs to acquire volatile data from a live Linux system, the physical access to the suspect machine is either restricted or unavailable. Which of the following steps will be the most suitable approach to perform this task?

  • A. The investigator should use the Belkasoft Live RAM Capturer on the forensic workstation, then remotely execute the tool on the suspect machine to acquire the RAM image
  • B. The investigator should initiate a listening session on the forensic workstation using 'netcat', then execute a 'dd' command on the suspect machine and pipe the output using 'netcat'
  • C. The investigator should leverage OSXPMem to remotely parse the physical memory in the Linux machine and create AFF4 format images for analysis
  • D. The investigator should employ the LiME tool and 'netcat', starting a listening session using tcp:port on the suspect machine and then establishing a connection from the forensic workstation using 'netcat'
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
044f354
1 month ago
Selected Answer: D
Answer: D Explanation: LiME (Linux Memory Extractor) (A) ❌ Belkasoft is for Windows (B) ❌ While viable, 'dd' is less specialized than LiME for memory forensics (C) ❌ OSXPMem is for macOS (D) ✅ LiME is purpose-built for Linux memory acquisition with minimal system impact Both option B and option D are valid techniques. EC Council Official CHFI https://bookshelf.vitalsource.com/reader/books/9781635676969/ Module 04 page 375 Step 4.2.1: Acquire Volatile Data from a Linux Machine Using dd and Netcat (Remote Acquisition) Module 04 page 377 Step 4.2.2. Acquire Volatile Data from a Linux Machine Using LiME and Netcat (Remote Acquisition) ----- If you agree: UPVOTE. If you disagree: discuss with citations. Both actions help crowdsource correct answers. When you upvote someone with a yellow "SELECTED ANSWER: " banner, your vote is added to the community vote distribution.
upvoted 1 times
...
Elb
4 months, 3 weeks ago
Selected Answer: D
To acquire RAM remotely over a network, the investigator must start a listening session on a suspect machine using tcp:port Command: insmod lime-<kernel_module>.ko “path=tcp:<port> format=lime” On the forensics workstation, the investigator should establish connection with the suspect machine using netcat and dump RAM data over the network Command: nc <IP Address of the Suspect Machine>:<port> > filename.mem
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago