EC-Council: Computer Hacking Forensic Investigator(CHFI-V10) |
||||
Module 2 : Computer Forensics Investigation Process |
||||
Questions available : 60 |
You are not logged in. Please Login for track your learning progress |
|||
Go to Question No. |
Question No 0
If you want to share the link of this question, please click here to "Copy Question Link" and share that generated link. Link from URL may change in future.
Comunity Comments:

Opted Answer: A
Investigators typically follow these steps:
Isolate the device to prevent remote access or data alteration.
Document the device’s state, including active applications and network connections.
Use forensic tools to capture volatile data before shutting down the device.
Preserve evidence by ensuring proper chain of custody.