A forensic investigator suspects that spyware has been installed to a Mac OS X computer by way of an update.
Which Mac OS X log or folder stores information about system and software updates?
Where does Windows store passwords for local user accounts?
A cybercriminal communicates with his compatriots using steganography. The FBI discovers that the criminal group uses white space to hide data in photographs.
Which tool can the cybercriminals use to facilitate this type of communication?
How should a forensic scientist obtain the network configuration from a Windows PC before seizing it from a crime scene?
A forensic investigator needs to know which file type to look for in order to find emails from a specific client.
Which file extension is used by Eudora?
A cybercriminal hacked into an Apple iPad that belongs to a company's chief executive officer (CEO). The cybercriminal deleted some important files on the data volume that must be retrieved.
Which hidden folder will contain the digital evidence?
Which information is included in an email header?
Which type of information does a Windows SAM file contain?
While collecting digital evidence from a running computer involved in a cybercrime, the forensic investigator makes a list of items that need to be collected.
Which piece of digital evidence should be collected first?
A forensic investigator is acquiring evidence from an iPhone.
What should the investigator ensure before the iPhone is connected to the computer?