Reference no: EM133882722
Question 1
A terminated employee denies knowledge of inappropriate files found on their encrypted workstation (Windows 10, BitLocker enabled). Security logs indicate access after business hours.
Required:
a) Describe the forensic workflow you would follow to investigate this case, including acquisition, analysis, and validation steps.
b) Identify two forensic tools you would use to detect user activity and timeline reconstruction. Justify your selection.
c) Explain how you would ensure evidence integrity and chain of custody.
Question 2
You suspect a user is operating unauthorized virtual machines (VMs) within their corporate device to exfiltrate data.
Required:
a) List forensic indicators that suggest a VM was installed or running recently.
b) What are the specific challenges of analysing a live VM environment? Get affordable and professional assignment help now!
c) Which acquisition method would you choose (live vs static)? Provide justification.
Question 3
Part A:
You're investigating a phishing email scheme from a suspect's device. You have limited system access.
Required:
a) Which data acquisition method would you apply and why?
b) Describe the acquisition process and its advantages/limitations.
Part B - Court Appearance:
You're summoned as a digital forensic expert witness.
Required:
a) Differentiate between an expert witness and a fact witness.
b) How would you prepare and behave in court during cross-examination?
Question 4
You are investigating file metadata and timestamps on an NTFS volume using WinHex.
Required:
a) Define sectors and clusters and explain their relationship.
b) Differentiate between Logical Cluster Number (LCN) and Virtual Cluster Number (VCN).
c) At which offset in an MFT entry do you find the record size and header length? Why are attributes 0x10 and 0x30 important?
Question 5
a) Define digital evidence and provide two real-world examples.
b) Explain the importance of preserving digital evidence integrity. What procedures should be followed?
c) What is a Chain of Custody (CoC) form? List four key attributes it must include.