+1443 776-2705 panelessays@gmail.com

Answer each question thoroughly. 

1. Briefly discuss some basic strategies for circumventing CMOS passwords.

The answer should include the following points:

  • Jumping the CMOS password
  • Short-circuiting the chip
  • Pulling the battery
  • Recovering passwords
  • Default passwords
  • Social engineering/brute force
  • Key disks

2. Which are the most common places in a suspect computer where traces of evidence from Internet activity can be found?

The answer should include the following points:

  • Internet Protocol (IP) Addresses
  • Domain Name System
  • MAC Address
  • Traceroute

3. Discuss forensic investigation in non-Window operating systems.

The answer should include the following points:

  • Macintosh operating system
  • Imaging
  • Finding evidence
  • Forensic toolkits: Black Bag Technologies Mac Forensic Software and MacForensicsLab
  • Linux/Unix Operating Systems
  • Tools: Maresware: Linux Forensics, the Farmer’s Boot CD, and SMART

4. Why is documentation so important for any successful criminal investigation? List the minimum non-computer-specific documentation required for an investigation.

The answer should include the following points:

  • Investigative tactics and collection procedures dissected in court
  • Inalienable credibility with judicial officials
  • Facilitates the chain of custody necessary for evidence validity
  • Photographed or videotaped evidence nullifies defense arguments that officers contaminated or corrupted criminal evidence

5. What steps must be taken to protect computer evidence from getting destroyed, contaminated, or corrupted?