According to NIST 86, which action describes the volatile data collection?
A. Collect data before rebooting
B. Collect data while rebooting
C. Collect data after rebooting
D. Collect data that contains malware
According to NIST 86, which action describes the volatile data collection?
A. Collect data before rebooting
B. Collect data while rebooting
C. Collect data after rebooting
D. Collect data that contains malware
Volatile OS data involving an event can be collected only from a live system that has not been rebooted
or shut down since the event occurred