ECCouncil 112-57 - EC-Council Digital Forensics Essentials (DFE)
Kelvin, a forensic investigator at FinCorp Ltd., was investigating a cybercrime against the company. As part of the investigation process, he needs to recover corrupted and deleted files from a Windows system. Kelvin decided to use an automated tool to recover the damaged, corrupted, or deleted files.
Which of the following forensic tools can help Kelvin in recovering deleted files?
Wesley, a professional hacker, deleted a confidential file in a compromised system using the “/bin/rm/†command to deny access to forensic specialists.
Identify the operating system on which Don has performed the file carving act.
