Which Windows 7 operating system log stores events collected from remote computers?
Which tool should a forensic investigator use to determine whether data are leaving an organization through steganographic methods?
Which law includes a provision permitting the wiretapping of VoIP calls?
What is a reason to use steganography?
Which directory contains the system's configuration files on a computer running Mac OS X?
Thomas received an email stating he needed to follow a link and verify his bank account information to ensure it was secure. Shortly after following the instructions, Thomas noticed money was missing from his account.
Which digital evidence should be considered to determine how Thomas' account information was compromised?
The human resources manager of a small accounting firm believes he may have been a victim of a phishing scam. The manager clicked on a link in an email message that asked him to verify the logon credentials for the firm's online bank account.
Which digital evidence should a forensic investigator collect to investigate this incident?
A forensic investigator wants to collect evidence from a file created by a Macintosh computer running OS X 10.8.
Which file type can be created by this OS?
Which policy is included in the CAN-SPAM Act?
Which type of information does a Windows SAM file contain?