A suspicious laptop is found in a datacenter. The laptop is on and processing data, although there is no application open on the screen. Which of the following BEST describes a Windows tool and technique that an investigator should use to analyze the laptop's RAM for working applications?
Edna
2 months agoShawna
2 months agoHildred
2 months agoHector
11 days agoRoxane
15 days agoLauna
20 days agoGilbert
28 days agoLeonora
2 months agoFabiola
2 months agoQuentin
29 days agoCyndy
1 months agoIsabelle
1 months agoHillary
2 months agoOlga
2 months agoLorrie
2 months agoChristiane
3 months agoBerry
3 months agoVivan
3 months agoMalcom
3 months agoCarey
4 months agoZona
4 months ago