During a computer hacking forensic investigation, an investigator is tasked with acquiring volatile data from a live Linux system with limited physical access. Which methodology would be the most suitable for this scenario?
A.
Using Belkasoft Live RAM Capturer to extract the entire contents of the computer’s volatile memory
B.
Performing remote acquisition of volatile data from a Linux machine using dd and netcat
C.
Using the fmem module and dd command locally to access the RAM and acquire its content directly
D.
Performing local acquisition of RAM using the LiME tool
Acquire Volatile Data from a Windows Machine ( Windows based )
Acquire Volatile Data from a Linux Machine Using dd (Linux Local Acquisition)
Acquire Volatile Data from a Linux Machine Using dd and Netcat (Linux Remote Acquisition)
Acquire Volatile Data from a Linux Machine Using LiME (Linux Local Acquisition)
upvoted 3 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Elb
6 months ago