+1443 776-2705 panelessays@gmail.com
  

Answer each question thoroughly. 

1. Briefly discuss some basic strategies for circumventing CMOS passwords.

The answer should include the following points:

  • Jumping the CMOS password
  • Short-circuiting the chip
  • Pulling the battery
  • Recovering passwords
  • Default passwords
  • Social engineering/brute force
  • Key disks

2. Which are the most common places in a suspect computer where traces of evidence from Internet activity can be found?

The answer should include the following points:

  • Internet Protocol (IP) Addresses
  • Domain Name System
  • MAC Address
  • Traceroute

3. Discuss forensic investigation in non-Window operating systems.

The answer should include the following points:

  • Macintosh operating system
  • Imaging
  • Finding evidence
  • Forensic toolkits: Black Bag Technologies Mac Forensic Software and MacForensicsLab
  • Linux/Unix Operating Systems
  • Tools: Maresware: Linux Forensics, the Farmer’s Boot CD, and SMART

4. Why is documentation so important for any successful criminal investigation? List the minimum non-computer-specific documentation required for an investigation.

The answer should include the following points:

  • Investigative tactics and collection procedures dissected in court
  • Inalienable credibility with judicial officials
  • Facilitates the chain of custody necessary for evidence validity
  • Photographed or videotaped evidence nullifies defense arguments that officers contaminated or corrupted criminal evidence

5. What steps must be taken to protect computer evidence from getting destroyed, contaminated, or corrupted?

PreviousNext