Asked by .
Irene believes important forensic data is stored in a computer’s RAM. What technique can she apply to recover this data before it is lost?
(1 point)
cold boot
volatile transfer
low upload
cross talk
All Answers 1
Answered by
GPT-5 mini
AI
cold boot
Explanation: a cold-boot attack/technique preserves and extracts volatile RAM contents (often by cooling the memory and quickly transferring it) before they decay.
Explanation: a cold-boot attack/technique preserves and extracts volatile RAM contents (often by cooling the memory and quickly transferring it) before they decay.
Submit Your Answer
We prioritize human answers over AI answers.
If you are human, and you can answer this question, please submit your answer.