Farley is a forensics examiner specializing in email forensics. He does not like it when an email administrator uses log rotation instead of logging. Why does Farley dislike log rotation?
Jayden finds several saved web pages on a suspect’s computer…
Jayden finds several saved web pages on a suspect’s computer. They look like legitimate web pages, but this suspect is a known child pornographer, so the police are on the lookout for images and messages that might be in the suspect’s possession. How does Jayden go about searching for this evidence?
When conducting a computer investigation for potential crimi…
When conducting a computer investigation for potential criminal violations of the law, the legal processes you follow depend on local customs, legislative standards, and rules of evidence. In general, however, a criminal case follows three stages. What are those three stages?
Command-line forensic tools give one a lot of control when a…
Command-line forensic tools give one a lot of control when acquiring RAM but might give false readings in Windows OSs.
Joe has been tasked with investigating an incident at Zander…
Joe has been tasked with investigating an incident at Zander Corp. What is the first rule he must follow that is important for all investigations, no matter how big or small?
Caleb created a hash value on a file he was working on befor…
Caleb created a hash value on a file he was working on before he left for the day. When he came back the next day, the hash value had changed. Since there was a change in hash value, what did that do to the file Caleb was working on?
Arno is about to buy a computer and build it into a forensic…
Arno is about to buy a computer and build it into a forensics workstation. What are the three most important factors Arno must consider for purchasing a computer and converting it into a forensic workstation?
Kailani is about to take possession of a Windows 2000 comput…
Kailani is about to take possession of a Windows 2000 computer for forensic investigation. Why must Kailani use older forensic tools for this Windows 2000 computer?
Abey is investigating a drive for some hidden files. She dis…
Abey is investigating a drive for some hidden files. She discovers the files at the end of a cluster. What is the unused space between the end of a file’s contents and the end of a cluster called?
Debbie is using F-Response Collect while performing a remote…
Debbie is using F-Response Collect while performing a remote acquisition. She needs to create digital forensic images. Since she doesn’t know what team will be reading these images, how will she create these images so they can be read by most forensics programs?