Volatile information can be easily modified or lost when the system is shut down or rebooted. It helps to determine a logical timeline of the security incident and the users who would be responsible.
A . True
B . False
Answer: A
Latest 312-49v9 Dumps Valid Version with 547 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund