List of questions
Related questions
Question 627 - 312-49v10 discussion
Consider a scenario where the perpetrator of a dark web crime has unlnstalled Tor browser from their computer after committing the crime. The computer has been seized by law enforcement so they can Investigate It for artifacts of Tor browser usage. Which of the following should the Investigators examine to establish the use of Tor browser on the suspect machine?
A.
Swap files
B.
Files in Recycle Bin
C.
Security logs
D.
Prefetch files
Your answer:
0 comments
Sorted by
Leave a comment first