Which of the following technical approaches would be the MOST feasible way to accomplish this capture?

An incident responder wants to capture volatile memory comprehensively from a running machine for forensic purposes. The machine is running a very recent release of the Linux OS.
Which of the following technical approaches would be the MOST feasible way to accomplish this capture?
A. Run the memdump utility with the -k flag.
B. Use a loadable kernel module capture utility, such as LiME.
C. Run dd on/dev/mem.
D. Employ a stand-alone utility, such as FTK Imager.

How to PASS CAS-004 in First Attempt?

FULL Printable PDF and Software. VALID exam to help you PASS.

comptia-exams

9 thoughts on “Which of the following technical approaches would be the MOST feasible way to accomplish this capture?

    1. A: wrong, as -k option would dump kernel memory (/dev/kmem) rather than physical memory
      C: wrong, you used to be able to simply dd /dev/mem back in the day, but no longer for security reasons – since kernel 2.6.

  1. I’ll stick with D…

    Question says comprehensive
    memdump -k flag is kernel memory.
    LiMEM – most everything I see points toward Android.
    dd might do it, I’m not the linux guy. I’m just not seeing enough evidence to contradict the given answer. From what I’ve read, FTK imager is very comprehensive in its capabilities.

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.