EC-Council: Computer Hacking Forensic Investigator(CHFI-V10) |
||||
Module 2 : Computer Forensics Investigation Process |
||||
Questions available : 60 |
You are not logged in. Please Login for track your learning progress |
|||
Go to Question No. |
Question No 50
If you want to share the link of this question, please click here to "Copy Question Link" and share that generated link. Link from URL may change in future.
Comunity Comments:

Opted Answer: C
Timeframe Analysis – Determines when events occurred, helping investigators establish timelines.
Data Hiding Analysis – Identifies concealed or encrypted data that may require further extraction.
Application and File Analysis – Examines software and files to uncover relevant evidence.
Ownership and Possession Analysis – Establishes who had access to or control over the data