As an investigator, you are charged with creating a timeline of a user's Internet activity on a company computer. When going into the user's temporary Internet files, you see that the directory is empty. You know that the company has a policy restricting the person from seeing hidden directories on the system, so it is unlikely that they were able to delete them. How is it possible that this

directory is empty?

a. The user is implementing a rootkit that bypasses system security and gives them access to the directory.
b. The user has configured Internet Explorer to delete the history every time she logs off.
c. The user has selected the box in Temporary Internet Files and History that says, "Every time I start Internet Explorer."
d. This isn't possible. IE always stores cached files permanently.


b.

Computer Science & Information Technology

You might also like to view...

You can click the Line button on the ____ tab to draw a line on a report.

A. Standard B. Formatting C. Toolbox D. Design

Computer Science & Information Technology

________ is a feature in Word that records changes and comments made to a document by others

A) Track Changes B) Reviews C) Comments D) Editor

Computer Science & Information Technology

Describe in general how you would remove any continue statement from a loop in a program and replace that statement with some structured equivalent. Use the technique you developed here to remove the continue statement from the program of Fig. 15.12.

What will be an ideal response?

Computer Science & Information Technology

A ________ is a note that accompanies content copied from another source crediting the original source or author

A) comment B) citation C) URL D) macro

Computer Science & Information Technology