Which type of digital evidence should a forensic investigator collect from a phishing incident involving email?

Prepare for the WGU ITAS2140 D431 Digital Forensics Exam with concise flashcards and exhaustive multiple-choice questions. Each question provides explanations and hints. Master your exam!

In a phishing incident involving email, the most pertinent type of digital evidence to collect is the browser cache. The browser cache holds temporary files and data stored by the web browser when a user visits websites. This includes copies of web pages, images, and other resources, which can provide insights into the phishing activity. Forensic investigators can analyze the browser cache to uncover the specific phishing site visited, time of the visit, and any interactions the user may have had with the malicious site.

This information is vital because it helps establish the timeline of events during the phishing attack, the user's actions, and potentially the data that may have been compromised as a result. Understanding the browsing history in detail can also assist in identifying the perpetrators and preventing future attacks.

On the other hand, system logs and security logs may contain useful information about system events and security-related incidents but may not directly relate to the specific interactions with the phishing email. Disk cache, while it stores temporary files, is less specific than the browser cache regarding web activity associated with phishing incidents. Thus, the browser cache emerges as the most relevant source of digital evidence in this scenario.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy