Question 91

Billy, a computer forensics expert, has recovered a large number of DBX files during forensic investigation of a laptop. Which of the following email clients he can use to analyze the DBX files?
  • Question 92

    How will you categorize a cybercrime that took place within a CSP's cloud environment?
  • Question 93

    Which of the following tools will help the investigator to analyze web server logs?
  • Question 94

    When should an MD5 hash check be performed when processing evidence?
  • Question 95

    When an investigator contacts by telephone the domain administrator or controller listed by a whois lookup to request all e-mails sent and received for a user account be preserved, what U.S.C. statute authorizes this phone call and obligates the ISP to preserve e-mail records?