The ________ is a tool available for secure communications and anonymous web surfing. This network uses public–private key encryption, and, like Tor, websites are hosted anonymously. On the suspect's computer, the router.config file contains some information about I2P connectivity by the user

a. Freenet
b. Invisible Internet Project (I2P)
c. Opennet
d. None of the above


Answer: B. The investigator can also search for files with an .i2p extension on the suspect's computer.

Computer Science & Information Technology

You might also like to view...

The __________ cryptosystem is used in some form in a number of standards including DSS and S/MIME.

A. Rabin B. Rijnedel C. Hillman D. ElGamal

Computer Science & Information Technology

A ________ can be used to block unauthorized access to a network

A) filter B) firewall C) hub D) switch

Computer Science & Information Technology

Flow Layout method_________changes the alignment for the Flow Layout.

a. setLayout b. modifyAlignment c. setAlignment d. setAlign

Computer Science & Information Technology

Which of the following contains the user profile directory for Microsoft Windows 2000 and XP?

A. Users B. My Documents C. Documents and Settings D. Application Data

Computer Science & Information Technology