ECCouncil 312-49v11 Question Answer
During a live data acquisition procedure, forensic investigators are tasked with analyzing a suspected breach of a corporate network. The breach involves unauthorized access to sensitive files stored on the company's servers. Investigators aim to gather volatile data to trace the origin of the breach and identify potential network vulnerabilities.
In a live data acquisition scenario, which types of volatile data would investigators prioritize capturing to trace the intrusion's origin and identify network vulnerabilities?

