ECCouncil 312-49v11 Question Answer
Detective Sarah, a skilled digital forensics investigator, begins probing a compromised computer system linked to a cybercrime ring. Prioritizing volatile data, she meticulously plans her evidence-collection strategy. Amidst the investigation, various data sources emerge, each holding potential clues to unraveling the illicit scheme.
Which data source should you prioritize for collection, considering the order of volatility outlined in the RFC 3227 guidelines?

