Question 91
Billy, a computer forensics expert, has recovered a large number of DBX files during forensic investigation of a laptop. Which of the following email clients he can use to analyze the DBX files?
Question 92
How will you categorize a cybercrime that took place within a CSP's cloud environment?
Question 93
Which of the following tools will help the investigator to analyze web server logs?
Question 94
When should an MD5 hash check be performed when processing evidence?
Question 95
When an investigator contacts by telephone the domain administrator or controller listed by a whois lookup to request all e-mails sent and received for a user account be preserved, what U.S.C. statute authorizes this phone call and obligates the ISP to preserve e-mail records?
