EC-Council: Computer Hacking Forensic Investigator(CHFI-V10)
Module 2 : Computer Forensics Investigation Process
         
Questions available : 60 You are not logged in.
Please Login for track your learning progress
   
 
Q. No: 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 |
Go to Question No.



Question No 18


If you want to share the link of this question, please click here to "Copy Question Link" and share that generated link. Link from URL may change in future.
 

   
Bookmark this Question
QID: 333  
   
An executive had leaked the company trade secrets through an external drive. What process should the investigation team take if they could retrieve his system?


 
A:    Postmortem Analysis
 
B:    Real-Time Analysis
C:    Packet Analysis
 
D:    Malware Analysis
 
         

 
 

Diffence opinion in Correct Answer or any comment?
Vote / Comment for correct Answer



Comunity Comments:

Banwari on 15/05/2025
Opted Answer: A
Postmortem Analysis is a forensic process used to analyze digital evidence after an incident has occurred. It helps investigators:

Identify traces of data exfiltration from the external drive.

Recover deleted or modified files that may contain trade secrets.

Analyze system logs to determine how the breach happened.

Corroborate findings with other forensic techniques to build a case.

















WELCOME TO ONLINE EXAM PREPARATION SYSTEM

Certification Examinations