ECCouncil 312-49v11 Question Answer
A forensic team at a multinational corporation is investigating an alleged data breach. After thoroughly reviewing the system logs, the team discovers consistent outbound traffic from an internal system to a suspicious IP address linked with dark web activity. Upon inspecting the concerned system, they identify that the user had been using TOR for unsanctioned activities. To gather further evidence of TOR usage, which of the following techniques is least likely to yield substantial results?

