List of questions
Related questions
Question 133 - 312-49v10 discussion
You are a computer forensics investigator working with local police department and you are called to assist in an investigation of threatening emails. The complainant has printer out 27 email messages from the suspect and gives the printouts to you. You inform her that you will need to examine her computer because you need access to the _________________________ in order to track the emails back to the suspect.
A.
Routing Table
B.
Firewall log
C.
Configuration files
D.
Email Header
Your answer:
0 comments
Sorted by
Leave a comment first