Logs from an IDS show that a computer has been compromised with a botnet and is actively communicating with a command and control server. If the computer is powered off, which of the following data types will be unavailable for later investigation?
A.
Swap files, system processes, and master boot record
B.
Memory, temporary file system, and archival storage
C.
System disk, email, and log files
D.
Memory, network processes, and system processes