EC-Council: Computer Hacking Forensic Investigator(CHFI-V10)
Module 10 : Dark Web Forensics
         
Questions available : 2 You are not logged in.
Please Login for track your learning progress
   
 
Q. No: 1 | 2 |
Go to Question No.



Question No 0


If you want to share the link of this question, please click here to "Copy Question Link" and share that generated link. Link from URL may change in future.
 

   
Bookmark this Question
QID: 246  
   
Consider a scenario where the perpetrator of a dark web crime has uninstalled Tor browser from their computer after committing the crime. The computer has been seized by law enforcement so they can investigate it for artifacts of Tor browser usage. Which of the following should the investigators examine to establish the use of Tor browser on the suspect machine?


 
A:    Prefetch files
 
B:    Security logs
C:    Files in Recycle Bin
 
D:    Swap files
 
         

 
 

Diffence opinion in Correct Answer or any comment?
Vote / Comment for correct Answer




















WELCOME TO ONLINE EXAM PREPARATION SYSTEM

Certification Examinations