ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 627 - 312-49v10 discussion

Report
Export

Consider a scenario where the perpetrator of a dark web crime has unlnstalled Tor browser from their computer after committing the crime. The computer has been seized by law enforcement so they can Investigate It for artifacts of Tor browser usage. Which of the following should the Investigators examine to establish the use of Tor browser on the suspect machine?

A.
Swap files
Answers
A.
Swap files
B.
Files in Recycle Bin
Answers
B.
Files in Recycle Bin
C.
Security logs
Answers
C.
Security logs
D.
Prefetch files
Answers
D.
Prefetch files
Suggested answer: D
asked 18/09/2024
michael brooks
37 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first