EC-Council: Computer Hacking Forensic Investigator(CHFI-V10) |
||||
Module 8 : Network Forensics |
||||
Questions available : 133 |
You are not logged in. Please Login for track your learning progress |
|||
Go to Question No. |
Question No 75
If you want to share the link of this question, please click here to "Copy Question Link" and share that generated link. Link from URL may change in future.
Comunity Comments:

Opted Answer: D
profiles: Stores information about Network profiles on a Windows system.
it track networks the device has connected to, including details like SSID (network name) and connection settings.
Interfaces: to store network configuration settings for different network interfaces. this registry key contains network interface settings, including IP configurations, which helped investigators trace the unauthorized access.