EC-Council: Computer Hacking Forensic Investigator(CHFI-V10) |
||||
Module 2 : Computer Forensics Investigation Process |
||||
| Questions available : 60 |
You are not logged in. Please Login for track your learning progress |
|||
| Go to Question No. | |||
Question No 0
If you want to share the link of this question, please click here to "Copy Question Link" and share that generated link. Link from URL may change in future.
Comunity Comments:
Opted Answer: C
Timeframe Analysis – Determines when events occurred, helping investigators establish timelines.
Data Hiding Analysis – Identifies concealed or encrypted data that may require further extraction.
Application and File Analysis – Examines software and files to uncover relevant evidence.
Ownership and Possession Analysis – Establishes who had access to or control over the data
