ECCouncil 312-49v11 Question Answer
In a large multinational organization, an advanced persistent threat (APT) has been detected. One of the Linux servers of the company seems to be communicating with a known malicious IP address. Alice, a cybersecurity analyst, has been given the task to analyze the situation. She collects volatile information from the server to examine active network connections and running processes. Alice is confused between three options: Redline, Volatility, and Rekall. Which tool should Alice use to perform the analysis most effectively?

