Your company sells SaaS, and your company itself is hosted in the cloud (using it as a PaaS). In case of a malware incident in your customer's database, who is responsible for eradicating the malicious software?
Marley was asked by his incident handling and response (IH&R) team lead to collect volatile datasuch as system information and network information present in the
registries, cache, and RAM of victim’s system.
Identify the data acquisition method Marley must employ to collect volatile data.
Which of the following is the ECIH phase that involves removing or eliminating the root cause of an incident and closing all attack vectors to prevent similar incidents in the future?
Patrick is doing a cyber forensic investigation. He is in the process of collecting physical
evidence at the crime scene.
Which of the following elements he must consider while collecting physical evidence?