Exam4Training

What can the investigator do to prove the violation?

A suspect is accused of violating the acceptable use of computing resources, as he has visited adult websites and downloaded images. The investigator wants to demonstrate that the suspect did indeed visit these sites. However, the suspect has cleared the search history and emptied the cookie cache. Moreover, he has removed any images he might have downloaded.

What can the investigator do to prove the violation?
A . Image the disk and try to recover deleted files
B . Seek the help of co-workers who are eye-witnesses
C . Check the Windows registry for connection data (you may or may not recover)
D . Approach the websites for evidence

Answer: A

Latest 312-49v9 Dumps Valid Version with 547 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Exit mobile version