ECCouncil 312-49v11 Question Answer
Henry, a forensic investigator, is analysing a system suspected of being compromised by a stealthy rootkit. The rootkit appears to be sophisticated, hiding its files and processes to avoid detection. Henry decides to conduct a memory and registry analysis to uncover the hidden rootkit. Which of the following tools would be the best choice for Henry’s task?

