Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Lab 5 Drawing Conclusions Based on Investigative Research Purpose: To investigate and form an opinion based on a user's computing behavior. Application location: Virtual Computing

image text in transcribed

Lab 5 Drawing Conclusions Based on Investigative Research Purpose: To investigate and form an opinion based on a user's computing behavior. Application location: Virtual Computing Lab: FTK 5.0 / Windows 7 Preparation: Review background video/slides (on Blackboard) Evidence file: ubinst1.casper-rw.gen3.aff (located in Forensic Data folder on VCL desktop) Questions to answer: 1. What is the operating system (be specific - include the distribution) of this disk image? What is the file system? 2. This particular file system has what are called inodes. What is an inode? What information do inodes store? 3. What is the inode number of the Documents directory? 4. List two websites that the user had bookmarked on 1-7-2009. 5. What mail client does the user have? 6. Did the user have any mail in their inbox? If yes, what is the email address of the sender? 7. Find a document from Karen S. Evans about the planning guidance for Trusted Internet Connections (TIC). Who is the memorandum for? How many pages is the document? 8. Based on all of the documents and data on the user's computer, what can you surmise the user was trying to do? 9. Do you think this person was acting honestly or committing a crime? How did you come to this conclusion? Lab 5 Drawing Conclusions Based on Investigative Research Purpose: To investigate and form an opinion based on a user's computing behavior. Application location: Virtual Computing Lab: FTK 5.0 / Windows 7 Preparation: Review background video/slides (on Blackboard) Evidence file: ubinst1.casper-rw.gen3.aff (located in Forensic Data folder on VCL desktop) Questions to answer: 1. What is the operating system (be specific - include the distribution) of this disk image? What is the file system? 2. This particular file system has what are called inodes. What is an inode? What information do inodes store? 3. What is the inode number of the Documents directory? 4. List two websites that the user had bookmarked on 1-7-2009. 5. What mail client does the user have? 6. Did the user have any mail in their inbox? If yes, what is the email address of the sender? 7. Find a document from Karen S. Evans about the planning guidance for Trusted Internet Connections (TIC). Who is the memorandum for? How many pages is the document? 8. Based on all of the documents and data on the user's computer, what can you surmise the user was trying to do? 9. Do you think this person was acting honestly or committing a crime? How did you come to this conclusion

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Management With Website Development Applications

Authors: Greg Riccardi

1st Edition

0201743876, 978-0201743876

More Books

Students also viewed these Databases questions

Question

5. Prepare a plan of action and execute itstarting now!

Answered: 1 week ago