Question 126
Which of the following refers to the data that might still exist in a cluster even though the original file has been overwritten by another file?
Question 127
Which of the following email headers specifies an address for mailer-generated errors, like "no such user" bounce messages, to go to (instead of the sender's address)?
Question 128
Gary, a computer technician, is facing allegations of abusing children online by befriending them and sending them illicit adult images from his office computer. What type of investigation does this case require?
Question 129
All Blackberry email is eventually sent and received through what proprietary RIM-operated mechanism?
Question 130
What information do you need to recover when searching a victim's computer for a crime committed with specific e-mail message?
