🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

Chapter 20 - 02 - Understand Digital Evidence - 02_ocred_fax_ocred.pdf

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Full Transcript

Certified Cybersecurity Technician Exam 212-82 Computer Forensics Sources of Potential Evidence...

Certified Cybersecurity Technician Exam 212-82 Computer Forensics Sources of Potential Evidence Computer-Created User-Created Files User-Protected Files Files == Address books Address books -= Compressed cOmpressed files files =. Backup files Backup files = Database files. )! * Log Log files = Misnamed Misnamed files = Media (images, graphics, = Configuration files audio, video, etc.) files = Encrypted files * Encrypted files = Printer spool files *= Documents (text, = Password-protected files = Cookies spreadsheet, presentation, etc.) files =® Swap files *= Hidden Hidd en files files Swapflles =* Internet bookmarks, = System files favorites, etc. = Steganography Steganography = History files Temporary files Sources of Potential Evidence (Cont’d) Bt oo "text/" href="my:c - 1/ Hard Drive Text, picture, video, multimedia, database, and computer program files

Use Quizgecko on...
Browser
Browser