1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bogdanovich [222]
2 years ago
11

Carl is beginning a digital forensic investigation. he has been sent into the field to collect a machine. when he arrives, he se

es that the computer is running windows and has open applications. he decides to preserve as much data as possible by capturing data in memory. what should carl perform
Computers and Technology
1 answer:
postnew [5]2 years ago
6 0

Answer:

Volatile memory analysis

Explanation:

volatile data analysis in a computer's memory dump memory forensics is used by information security specialists to examine and identify assaults or harmful actions that leave no clearly identifiable trails on hard disk data which os what Carl decides to preserve as much data as possible by capturing data in memory

You might be interested in
Windows stores information from the Credential Manager application in secure folders called
Delicious77 [7]

Windows stores information from the Credential Manager application in secure folders called<u> VAULTS.</u>

<u></u>

Explanation:

  • A credential vault is a database used to store passwords and similar cryptographic key material.
  • The most common data stored in a credential vault are current and historical passwords to privileged accounts.
  • All credentials are saved in special folders on the computer, a place called Vaults. Moreover, you can back up all credentials to a file and restore them on to different computer.
  • Vault is a shareware program that acts as a bank vault, or safe, where you can keep you private information or files hidden and secure.
  • Everything in the vault is protected with an advanced encryption, and requires a password (your password) to open the vault to access the information.
8 0
3 years ago
PLZZZZ I NEED THE ANSWER NOW PLZZZZ!!!!!!!!!!!!!!!!!!!!!!!!! Which one of the following is considered a peripheral? A Software B
kaheart [24]

D is the answer  motherboard is correct

3 0
3 years ago
What are Three types of informational references
Irina-Kira [14]

Answer:

There are many types of information al references such as Encyclopedias, dictionaries, thesaurus Almanacs, atlases, thesauruses, Atlases, almanacs, and encyclopedias.

Explanation:

There are also informational websites. The way to find this is to look at the website url to see if it ends in .gov, .edu, and .org . But make sure you cite your source so you don't plagiarize.

If you don't have any questions feel free to ask in the comments.

3 0
3 years ago
Read 2 more answers
What are the tasks of a doc file
geniusboy [140]

Answer:

computer file is a computer resource for recording data discretely in a computer storage device. Just as words can be written to paper, so can information be written to a computer file. Files can be edited and transferred through the internet on that particular computer system.

6 0
4 years ago
What is the approximate time and death in Sherlock Holmes
kati45 [8]

Answer: 8:58.5204 o'clock a.m

:)

3 0
2 years ago
Read 2 more answers
Other questions:
  • List and describe three options in the autocad object snap toolbar
    8·1 answer
  • True or false. Embedding only part of a font is called presetting.
    14·1 answer
  • True / False
    5·1 answer
  • 2. Billys teacher asked him to type a report about asian food. Which paragraph format should he use?
    12·2 answers
  • Summary In this lab, you declare and initialize variables in a C++ program. The program, which is saved in a file named NewAge.c
    5·1 answer
  • ___________________ are aggregated collections of memory and cpu resources that can be shared among groups of virtual machines o
    11·1 answer
  • The profile picture that you plan to use to market your professional brand on social media networks should feature you only.
    12·1 answer
  • TOT al<br>Name TWO examples of these settings and utilities. (2)​
    12·1 answer
  • Write a function called no_you_pick. no_you_pick should have two parameters. The first parameter is a dictionary where the keys
    5·1 answer
  • You are working on a ticketing system. A ticket costs $10. The office is running a discount campaign: each group of 5 people is
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!