Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-49v10 All Questions

View all questions & answers for the 312-49v10 exam

Exam 312-49v10 topic 1 question 812 discussion

Actual exam question from ECCouncil's 312-49v10
Question #: 812
Topic #: 1
[All 312-49v10 Questions]

During a computer hacking forensic investigation, an investigator is tasked with acquiring volatile data from a live Linux system with limited physical access. Which methodology would be the most suitable for this scenario?

  • A. Using Belkasoft Live RAM Capturer to extract the entire contents of the computer’s volatile memory
  • B. Performing remote acquisition of volatile data from a Linux machine using dd and netcat
  • C. Using the fmem module and dd command locally to access the RAM and acquire its content directly
  • D. Performing local acquisition of RAM using the LiME tool
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Elb
6 months ago
Selected Answer: B
Acquire Volatile Data from a Windows Machine ( Windows based ) Acquire Volatile Data from a Linux Machine Using dd (Linux Local Acquisition) Acquire Volatile Data from a Linux Machine Using dd and Netcat (Linux Remote Acquisition) Acquire Volatile Data from a Linux Machine Using LiME (Linux Local Acquisition)
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...