During an investigation, a security analyst identified machines that are infected with malware the antivirus was unable to detect.
Which of the following is the BEST place to acquire evidence to perform data carving?
Click on the arrows to vote for the correct answer
A. B. C. D.A.
https://resources.infosecinstitute.com/memory-forensics/#gref https://www.computerhope.com/jargon/d/data-carving.htmWhen investigating malware infections, data carving can be a useful technique to recover data that has been deleted or hidden by the malware. Data carving is the process of extracting files and data from unallocated or free space on storage media.
To perform data carving, it is necessary to acquire evidence from the infected machines. The BEST place to acquire evidence for data carving depends on the type of data that needs to be recovered.
Of the options given, the BEST place to acquire evidence for data carving in this scenario is likely the hard drive (option B). Malware infections typically involve the installation of files on the infected system, which will be stored on the hard drive. These files may be deleted or hidden by the malware, but data carving can be used to recover them from unallocated space on the hard drive.
System memory (option A) can also be a valuable source of evidence during a malware investigation, as it may contain information about the malware's behavior and activity. However, data carving is typically not used on system memory.
Network packets (option C) can be a valuable source of evidence in some cases, but are not directly relevant to data carving.
The Windows Registry (option D) can be a valuable source of evidence during a malware investigation, as it may contain information about the malware's persistence mechanisms and other configuration details. However, data carving is typically not used on the registry.
In summary, the BEST place to acquire evidence for data carving during a malware investigation is likely the hard drive.