Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Lab 5 Drawing Conclusions Based on Investigative Research Purpose: To investigate and form an opinion based on a user's computing behavior. Application location: Virtual Computing
Lab 5 Drawing Conclusions Based on Investigative Research Purpose: To investigate and form an opinion based on a user's computing behavior. Application location: Virtual Computing Lab: FTK 5.0 / Windows 7 Preparation: Review background video/slides (on Blackboard) Evidence file: ubinst1.casper-rw.gen3.aff (located in Forensic Data folder on VCL desktop) Questions to answer: 1. What is the operating system (be specific - include the distribution) of this disk image? What is the file system? 2. This particular file system has what are called inodes. What is an inode? What information do inodes store? 3. What is the inode number of the Documents directory? 4. List two websites that the user had bookmarked on 1-7-2009. 5. What mail client does the user have? 6. Did the user have any mail in their inbox? If yes, what is the email address of the sender? 7. Find a document from Karen S. Evans about the planning guidance for Trusted Internet Connections (TIC). Who is the memorandum for? How many pages is the document? 8. Based on all of the documents and data on the user's computer, what can you surmise the user was trying to do? 9. Do you think this person was acting honestly or committing a crime? How did you come to this conclusion? Lab 5 Drawing Conclusions Based on Investigative Research Purpose: To investigate and form an opinion based on a user's computing behavior. Application location: Virtual Computing Lab: FTK 5.0 / Windows 7 Preparation: Review background video/slides (on Blackboard) Evidence file: ubinst1.casper-rw.gen3.aff (located in Forensic Data folder on VCL desktop) Questions to answer: 1. What is the operating system (be specific - include the distribution) of this disk image? What is the file system? 2. This particular file system has what are called inodes. What is an inode? What information do inodes store? 3. What is the inode number of the Documents directory? 4. List two websites that the user had bookmarked on 1-7-2009. 5. What mail client does the user have? 6. Did the user have any mail in their inbox? If yes, what is the email address of the sender? 7. Find a document from Karen S. Evans about the planning guidance for Trusted Internet Connections (TIC). Who is the memorandum for? How many pages is the document? 8. Based on all of the documents and data on the user's computer, what can you surmise the user was trying to do? 9. Do you think this person was acting honestly or committing a crime? How did you come to this conclusion
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started