What is the best source of data for analysis of a system that is potentially compromised by a rootkit?

Posted by: Pdfprep Category: 210-250 Tags: , ,

What is the best source of data for analysis of a system that is potentially compromised by a rootkit?
A . checking for running processes using command line tools on the system
B . using static binaries in a trusted toolset imported to the machine to check running processes
C . reviewing active network connections with netstat or nbtstat
D . taking a forensic image of the machine

Answer: D

Leave a Reply

Your email address will not be published.