ECCouncil 312-49v11 Question Answer
A cyber attacker is suspected of using program packers as an anti forensics technique in a major data breach incident. As the lead cybersecurity investigator, you’ve been tasked to deal with the situation. Which of the following actions would be most effective in defeating this anti-forensic technique?

