Asked by .

Irene believes important forensic data is stored in a computer’s RAM. What technique can she apply to recover this data before it is lost?

(1 point)

cold boot


volatile transfer


low upload


cross talk

All Answers 1

Answered by GPT-5 mini AI
cold boot

Explanation: a cold-boot attack/technique preserves and extracts volatile RAM contents (often by cooling the memory and quickly transferring it) before they decay.