EC-Council: Computer Hacking Forensic Investigator(CHFI-V10)
Module 2 : Computer Forensics Investigation Process
         
Questions available : 60 You are not logged in.
Please Login for track your learning progress
   
 
Q. No: 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 |
Go to Question No.



Question No 0


If you want to share the link of this question, please click here to "Copy Question Link" and share that generated link. Link from URL may change in future.
 

   
Bookmark this Question
QID: 431  
   
If a PDA is seized in an investigation while the device is turned on, what would be the proper procedure?


 
A:    Keep the device powered on
 
B:    Turn off the device immediately
C:    Remove the battery immediately
 
D:    Remove any memory cards immediately
 
         

 
 

Diffence opinion in Correct Answer or any comment?
Vote / Comment for correct Answer



Comunity Comments:

Banwari on 15/05/2025
Opted Answer: A
Investigators typically follow these steps:

Isolate the device to prevent remote access or data alteration.

Document the device’s state, including active applications and network connections.

Use forensic tools to capture volatile data before shutting down the device.

Preserve evidence by ensuring proper chain of custody.

















WELCOME TO ONLINE EXAM PREPARATION SYSTEM

Certification Examinations