ECCouncil 312-49v11 Question Answer
As a forensic investigator, you’re looking into a case of industrial espionage at a manufacturing company. An insider is suspected of stealing proprietary CAD designs. The suspect ' s computer, which runs on a Windows OS, has been isolated. The company’s IT team accidentally shut down the computer, which may have resulted in the loss of volatile data. In this context, what would be the best way to proceed with non-volatile data acquisition?

