As an investigator, you are charged with creating a timeline of a user's Internet activity on a company computer. When going into the user's temporary Internet files, you see that the directory is empty. You know that the company has a policy restricting the person from seeing hidden directories on the system, so it is unlikely that they were able to delete them. How is it possible that this
directory is empty?
a. The user is implementing a rootkit that bypasses system security and gives them access to the directory.
b. The user has configured Internet Explorer to delete the history every time she logs off.
c. The user has selected the box in Temporary Internet Files and History that says, "Every time I start Internet Explorer."
d. This isn't possible. IE always stores cached files permanently.
b.
You might also like to view...
An ________ is a line that serves as a frame of reference for measurement.
a. axis b. plot area c. category axis d. value axis
To improve the quality of your search, you can do all of the following except _______ .
A. subscribe to the deep web B. use search operators C. filter search results D. customize browser settings