• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

Guide to Computer Forensics and Investigations, 6e, 9781337568944

Testbanks Dec 30, 2025 ★★★★☆ (4.0/5)
Loading...

Loading document viewer...

Page 0 of 0

Document Text

Guide to Computer Forensics and Investigations, 6e, 9781337568944 Ch. 1 Solutions-1

Review Questions

  • Digital forensics and data recovery refer to the same activities. True or False?
  • False

  • Police in the United States must use procedures that adhere to which of the following?
  • Fourth Amendment
  • The triad of computing security includes which of the following?
  • Vulnerability/threat assessment, intrusion detection and incident response, and digital investigation
  • What’s the purpose of maintaining a network of digital forensics specialists?
  • To develop a list of colleagues who specialize in areas different from your own specialties in case you need help on an investigation.

  • Policies can address rules for which of the following?
  • Any of the above
  • List two items that should appear on a warning banner.
  • Statements that the organization has the right to monitor what users do, that their e-mail is not personal, and so on

  • Under normal circumstances, a private-sector investigator is considered an agent of law enforcement.
  • True or False?False

  • List two types of digital investigations typically conducted in a business environment.
  • Fraud, embezzlement, insider trading, espionage, and e-mail harassment

  • What is professional conduct, and why is it important?
  • Professional conduct includes ethics, morals, and standards of behavior. It affects a professional’s credibility.

  • What’s the purpose of an affidavit?
  • To provide facts in support of evidence of a crime to submit to a judge when requesting a search warrant

  • What are the necessary components of a search warrant?
  • A search warrant must specify who, what, when, and where—that is, specifics on place, time, items being searched for, and so forth—and include any supporting materials (affidavits and exhibits, for example). In addition, a search warrant must be signed by an impartial judicial officer. In many cases, a search warrant can limit the scope of what can be seized.

  • What are some ways to determine the resources needed for an investigation?
  • Determine the OS of the suspect computer and list the software needed for the examination.

  • List three items that should be on an evidence custody form.
  • Answers include case number, name of the investigator assigned to the case, nature of the case, location where evidence was obtained, description of the evidence, and so on.Chapter 1 (Guide to Computer Forensics and Investigations, 6e Bill Nelson, Amelia Phillips, Christopher Steuart) (Solution Manual, For Complete File, Download link at the end of this File) 1 / 4

Guide to Computer Forensics and Investigations, 6e, 9781337568944 Ch. 1 Solutions-2

  • Why should you do a standard risk assessment to prepare for an investigation?
  • To list problems that might happen when conducting an investigation, which can help in planning your case

  • You should always prove the allegations made by the person who hired you. True or False?
  • False

  • For digital evidence, an evidence bag is typically made of antistatic material. True or False?
  • True

  • Why should evidence media be write-protected?
  • To make sure data isn’t altered

  • List three items that should be in your case report.
  • Answers can include an explanation of basic computer and network processes, a narrative of what steps you took, a description of your findings, and log files generated from your analysis tools.

  • Why should you critique your case after it’s finished?
  • To improve your work

  • What do you call a list of people who have had physical possession of the evidence?
  • Chain of custody

  • Data collected before an attorney issues a memo for an attorney-client privilege case is
  • protected under the confidential work product rule. True or False?False. All data collected before an attorney issues notice of attorney-client privilege is subject to discovery by opposing counsel.Hands-On Projects Hands-On Project 1-1 Students should be able to find two files of interest to this case. The first file, in Autopsy’s Documents folder, is a text message pleading for help. The second file, in Autopsy’s Plain Text folder, is an Excel spreadsheet containing the victim’s assets and their values. Students’ reports should include basic information about each file found on the USB drive.Hands-On Project 1-2 Students should be able to find eight message files and one LibreOffice Calc spreadsheet. They should create a spreadsheet listing information about these files with Autopsy’s report generator. They should also submit a short report listing the files they found in the disk image and include the Autopsy spreadsheet.Hands-On Project 1-3 Students should be able to find three files showing a sailboat and sections of a sailboat and create an HTML

Web report with links to the sailboat files, which are as follows:

/img_C1Prj03.E01/Pictures/Boat Building/PICT0010.JPG

2006-04-13 21:16:26 PDT 2 / 4

Guide to Computer Forensics and Investigations, 6e, 9781337568944 Ch. 1 Solutions-3

0000-00-00 00:00:00

2006-07-30 00:00:00 PDT

2006-07-30 18:04:43 PDT

415407

bdd77bb8089f147d16fb4fd11039e951

/img_C1Prj03.E01/Pictures/Boat Building/PICT0012.JPG

2006-04-13 21:16:42 PDT

0000-00-00 00:00:00

2006-07-30 00:00:00 PDT

2006-07-30 18:04:44 PDT

230593

fb6613de0ece7b5ca0e0ef7f520f2294

/img_C1Prj03.E01/Pictures/Boat Building/Boat Building/PICT0019.JPG

2006-04-14 19:15:32 PDT

0000-00-00 00:00:00

2006-07-30 00:00:00 PDT

2006-07-30 18:04:52 PDT

62676 5bf706c6309a71355a74260d1071186c Hands-On Project 1-4 Student should be able to find and export two allocated files from the Images subfolder and four allocated

files from the Office subfolder. The files are as follows:

6-Lin_tomb.jpg 16-Gettysbg.jpg 18-magnaCt.doc 19-USConst.doc 20-USDeclar.doc 22-Botany.doc Hands-On Project 1-5 Students should be able to find the deleted files in the Deleted Files subfolder, tag all deleted files, and

generate a spreadsheet listing the following files:

/img_C1Prj04.E01/Gettysburg.jpg /img_C1Prj04.E01/THE DECLARATION OF INDEPEND ENCE.doc /img_C1Prj04.E01/Amendments to the Constitution.doc /img_C1Prj04.E01/$CarvedFiles/f0000037.doc /img_C1Prj04.E01/Lincoln.jpg /img_C1Prj04.E01/Magna Carta.doc /img_C1Prj04.E01/USAmmend.doc /img_C1Prj04.E01/THE UNITED STATES CONSTITUTION.doc /img_C1Prj04.E01/$CarvedFiles/f0000000.jpg Hands-On Project 1-6 Students should be able to find four files and one unallocated area containing the keyword search results.When examining the unallocated area for the keyword Horatio, Autopsy’s Content Viewer defaults to the Media tab and displays a photograph of artwork for the path 3 / 4

Guide to Computer Forensics and Investigations, 6e, 9781337568944 Ch. 1 Solutions-4 /img_C1Prj06.E01//$Unalloc/Unalloc_19_29696_1474560. The keyword Horatio isn’t visiblein the Media tab. To see this keyword, students need to switch to the Indexed Text tab. In addition, this file’s content is visible only in the following path in the tree view: Results, Keyword Hits, Single Literal Keyword Search,

HORATIO.

Students’ reports should contain the following information:

Keyword: ANTONIO

Path & Filename: /img_C1Prj06.E01/The Merchant of Venice.doc

Modified date: 2004-06-23 21:25:20 PDT Create date: 2004-06-23 22:40:23 PDT

File size: 72704

Keyword: HORATIO

Path & Filename: /img_C1Prj06.E01//$Unalloc/Unalloc_19_29696_1474 560

Modified date: 0000-00-00 00:00:00 Create date: 0000-00-00 00:00:00

File size: 1019392

Keyword: HORATIO

Path & Filename: /img_C1Prj06.E01/$CarvedFiles/f0000068.doc

Modified date: 0000-00-00 00:00:00 Create date: 0000-00-00 00:00:00

File size: 90112

Keyword: HORATIO

Path & Filename: /img_C1Prj06.E01/The Tragedy of Hamlet.doc

Modified date: 2004-06-23 21:26:16 PDT Create date: 2004-06-23 22:40:33 PDT

File size: 90112

Keyword: HUGH EVANS

Path & Filename: /img_C1Prj06.E01/The Merry Wives of Windsor.doc

Modified date: 2004-06-23 21:24:40 PDT Create date: 2004-06-23 22:40:27 PDT

File size: 164352

Case Projects Case Project 1-1 Students need to do an assessment of what the case involves. What is the nature of the case? What challenges do they expect to encounter, and how much time do they think the investigation will take?Case Project 1-2 Most likely, Jonathan needs his computer to do other things in his business. Students need to acquire an image (preferably two) of the drive. Also, they should look around for clues of other storage media, and then go back to the lab and analyze the image. They should get as much detail as possible about the company and the other person.Case Project 1-3

  • / 4

User Reviews

★★★★☆ (4.0/5 based on 1 reviews)
Login to Review
S
Student
May 21, 2025
★★★★☆

The comprehensive coverage offered by this document helped me ace my presentation. A superb purchase!

Download Document

Buy This Document

$1.00 One-time purchase
Buy Now
  • Full access to this document
  • Download anytime
  • No expiration

Document Information

Category: Testbanks
Added: Dec 30, 2025
Description:

Guide to Computer Forensics and Investigations, 6e, 9781337568944 Ch. 1 Solutions-1 Review Questions 1. Digital forensics and data recovery refer to the same activities. True or False? False 2. Pol...

Unlock Now
$ 1.00