312-49v10 Exam Question 86

In conducting a computer abuse investigation you become aware that the suspect of the investigation is using ABC Company as his Internet Service Provider (ISP). You contact ISP and request that they provide you assistance with your investigation. What assistance can the ISP provide?
  • 312-49v10 Exam Question 87

    Paul is a computer forensics investigator working for Tyler & Company Consultants. Paul has been called upon to help investigate a computer hacking ring broken up by the local police. Paul begins to inventory the PCs found in the hackers hideout. Paul then comes across a PDA left by them that is attached to a number of different peripheral devices. What is the first step that Paul must take with the PDA to ensure the integrity of the investigation?
  • 312-49v10 Exam Question 88

    What does the part of the log, "% SEC-6-IPACCESSLOGP", extracted from a Cisco router represent?
  • 312-49v10 Exam Question 89

    What happens when a file is deleted by a Microsoft operating system using the FAT file system?
  • 312-49v10 Exam Question 90

    The Recycle Bin exists as a metaphor for throwing files away, but it also allows a user to retrieve and restore files. Once the file is moved to the recycle bin, a record is added to the log file that exists in the Recycle Bin. Which of the following files contains records that correspond to each deleted file in the Recycle Bin?