312-49v10 Exam QuestionsBrowse all questions from this exam

312-49v10 Exam - Question 404


Consider a scenario where the perpetrator of a dark web crime has uninstalled Tor browser from their computer after committing the crime. The computer has been seized by law enforcement so they can investigate it for artifacts of Tor browser usage. Which of the following should the investigators examine to establish the use of Tor browser on the suspect machine?

Show Answer
Correct Answer: A,D

Swap files (or page files) can contain remnants of data from applications that were recently used, including Tor browser. Even if the Tor browser has been uninstalled, its artifacts might still be present in the swap files, which can provide evidence of its previous usage. Other options, such as security logs, files in the Recycle Bin, or prefetch files, are less likely to contain direct evidence of the Tor browser's activity.

Discussion

1 comment
Sign in to comment
aqeel1506Option: A
Jul 21, 2024

A. Swap files Swap files (or page files) can contain remnants of data from applications that were recently used, including Tor browser. Even if the Tor browser has been uninstalled, its artifacts might still be present in the swap files, which can provide evidence of its previous usage. Other options, such as security logs, files in the Recycle Bin, or prefetch files, might not provide as direct evidence of Tor browser activity as the swap files can.