Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-49v10 All Questions

View all questions & answers for the 312-49v10 exam

Exam 312-49v10 topic 1 question 611 discussion

Actual exam question from ECCouncil's 312-49v10
Question #: 611
Topic #: 1
[All 312-49v10 Questions]

Consider a scenario where the perpetrator of a dark web crime has uninstalled Tor browser from their computer after committing the crime. The computer has been seized by law enforcement so they can investigate it for artifacts of Tor browser usage. Which of the following should the investigators examine to establish the use of Tor browser on the suspect machine?

  • A. Swap files
  • B. Security logs
  • C. Files in Recycle Bin
  • D. Prefetch files
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
aqeel1506
4 months ago
A. Swap files Swap files (or page files) can contain remnants of data from applications that were recently used, including Tor browser. Even if the Tor browser has been uninstalled, its artifacts might still be present in the swap files, which can provide evidence of its previous usage. Other options, such as security logs, files in the Recycle Bin, or prefetch files, might not provide as direct evidence of Tor browser activity as the swap files can.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...