Question 126

Which of the following refers to the data that might still exist in a cluster even though the original file has been overwritten by another file?
  • Question 127

    Which of the following email headers specifies an address for mailer-generated errors, like "no such user" bounce messages, to go to (instead of the sender's address)?
  • Question 128

    Gary, a computer technician, is facing allegations of abusing children online by befriending them and sending them illicit adult images from his office computer. What type of investigation does this case require?
  • Question 129

    All Blackberry email is eventually sent and received through what proprietary RIM-operated mechanism?
  • Question 130

    What information do you need to recover when searching a victim's computer for a crime committed with specific e-mail message?