Skillset can help you prepare! Sign up for your free Skillset account and take the first steps towards your certification.
Which configuration makes way for the best retrieval of evidence of an injection attack during a dead acquisition?
Computer with less memory but large swap space
Paging
Virtual machine
Computer memory that equals swap space
The correct answer is a computer with less memory but large swap space. The code injection attack infects the memory processes. If the computer is shut down - i.e., dead acquisition - there is no way of retrieving evidence of the attack.
Train with Skillset and pass your certification exam. Faster. Guaranteed.
Study thousands of practice questions that organized by skills and ranked by difficulty.
Create a tailored training plan based on the knowledge you already possess.
Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.