A forensic investigator is analyzing a Windows system for possible malicious activity. The investigator is specifically interested in the recent actions of a suspect on the system, including any deleted directories or files, mounted drives, and actions taken. Which of the following approaches and tools would be the most effective for obtaining this information?
4bd3116
4 months agoaqeel1506
4 months agoElb
5 months, 2 weeks agoElb
5 months, 2 weeks agoElb
5 months, 2 weeks agoElb
5 months, 4 weeks ago