Term 3 Practice Questions - CSU2104 - Shoolini U

Term 3 Practice Questions

What is the goal of computer forensics?

Computer forensics aims to collect, preserve, analyze and present digital evidence to reconstruct events and support legal or organizational decisions:

Define traditional crime.

Traditional crime refers to illegal activities that occur in the physical world, often involving direct harm to individuals or property:

What is “identity fraud”?

Identity fraud is the unauthorized use or theft of personal identifying information to impersonate someone for financial or other gain:

What is meant by a “phishing attack”?

A phishing attack is a social-engineering scam where attackers impersonate trusted entities to steal credentials or install malware:

Define the term “hacking.”

Hacking is the unauthorized exploitation of system, network or application flaws to gain access, steal data or disrupt operations:

What is a disk image?

A disk image is an exact bit-for-bit copy of a storage device (HDD, SSD, USB) saved as a single file:

What is a bit-stream copy?

A bit-stream copy is a raw, binary-level duplication of storage media, capturing every bit from the first to the last sector:

What is a write-blocker and why is it used?

A write-blocker is a hardware or software tool that prevents any write commands from reaching original media:

What is live acquisition?

Live acquisition is capturing volatile data from a running system without shutdown:

What is a hash value (e.g., MD5 or SHA-1)?

A hash value is a fixed-length digital fingerprint computed from data; any change to the data alters the hash:

Define Computer Forensics and explain its primary objectives.

Computer forensics is the systematic process of collecting, preserving, analyzing and presenting digital evidence to support investigations:

What are the key challenges faced in computer forensic investigations?

Explain the importance of Chain of Custody in handling digital evidence.

Chain of custody is the detailed record of who collected, handled and transferred evidence:

List and briefly describe the five phases of the computer forensics process.

  1. Identification: Spot devices and data that may hold evidence.
  2. Preservation: Secure originals with write-blockers; document custody.
  3. Acquisition: Create bit-for-bit images and RAM snapshots.
  4. Examination & Analysis: Recover files, parse logs, reconstruct events.
  5. Reporting/Presentation: Compile findings into clear, time-stamped reports; testify if needed.

Discuss the major legal and ethical issues in a digital investigation.

Describe standard phases of a computer forensic investigation (from acquisition through presentation).

  1. Acquisition:
    • Activities: Use write-blockers to image drives; capture RAM with tools like DumpIt.
    • Challenges: Locked/encrypted systems; avoiding data alteration.
    • Example: Imaging a suspect’s laptop HDD before analysis.
  2. Examination:
    • Activities: Carve deleted files with Autopsy; parse metadata and logs.
    • Challenges: Large data volume; encrypted or proprietary formats.
    • Example: Extracting deleted emails from a disk image.
  3. Analysis:
    • Activities: Correlate artifacts to build timelines; identify malicious code with Volatility.
    • Challenges: False positives; complex data relationships.
    • Example: Mapping file timestamps to user login records in a breach.
  4. Presentation:
    • Activities: Write concise reports; prepare slides; provide expert testimony.
    • Challenges: Explaining technical details to non-experts.
    • Example: Testifying in court about how stolen data was recovered and traced.

What is data carving?

Data carving is recovering files by scanning raw disk images for file signatures (headers/footers) without relying on file system metadata.

What is a journaling file system?

A journaling file system logs metadata changes in a journal before committing them to the main file system to ensure consistency after crashes.

What is the Master File Table (MFT)?

The MFT is NTFS’s central metadata repository where each file and directory has a record with its attributes and data pointers.

What is keyword searching in forensics?

Keyword searching scans collected data for specific terms or patterns to quickly locate relevant evidence.

What is network forensics?

Network forensics captures and analyzes network traffic and logs to investigate intrusions, data exfiltration and malware communication.

What is timeline analysis?

Timeline analysis orders artifacts (logs, file timestamps) chronologically to reconstruct event sequences.

What is metadata?

Metadata is data about data, describing attributes like author, creation/modification timestamps and file size.

What is malware forensics?

Malware forensics analyzes malicious code samples to understand behavior, payloads and command-and-control mechanisms.

What is triage in digital investigations?

Triage prioritizes data sources and devices based on relevance and time constraints to focus analysis efforts effectively.

What is logical acquisition?

Logical acquisition copies selected files and directories via the file system’s API without imaging entire media.

List three hashing algorithms commonly used in forensics (e.g., MD5, SHA-1, SHA-256). For each, state one advantage and one limitation.

What is a registry hive? Name two forensic artifacts you can extract from it and their significance.

A registry hive is a Windows database file storing a portion of the system registry.

Explain what slack space is and outline one technique for recovering hidden data from it.

Slack space is unused space in the last cluster of a file that may contain remnants of previous files.

Define each (volatile vs. non-volatile data), give two examples, and explain why volatile data must be captured first.

Compare and contrast NTFS and FAT file systems in terms of metadata structures (e.g., MFT vs. directory entries). Explain how an investigator recovers deleted files and analyzes slack space in each.

Describe the different categories of digital evidence (e.g., volatile vs. non-volatile, network logs, registry entries). For each category, explain its forensic value, how it’s collected, and give a practical example.

Define the following terms: E01 image; Physical acquisition; AFF (Advanced Forensic Format); Hex editor; SIM card reader; Cloud snapshot; API log; Volume header; eDiscovery; Encryption.

List the key sections of an examiner’s report (minimum five) and state the purpose of each.

  1. Cover Page: Case ID, examiner’s name, date – identifiers for reference.
  2. Executive Summary: High-level findings and conclusions – quick overview for decision-makers.
  3. Scope & Objectives: Investigation boundaries and goals – defines what was/searched and why.
  4. Methodology: Tools, processes and configurations used – ensures transparency and repeatability.
  5. Findings & Analysis: Detailed evidence artifacts, interpretations and timelines – core of the report.
  6. Conclusions & Recommendations: Summarizes impact, suggests next steps or mitigation – guides stakeholders.
  7. Appendices: Hash lists, logs, evidence inventory – supports verification and court admissibility.

Define “anti-forensics.” List two common techniques and one countermeasure for each.

Briefly explain each carving technique, when you’d choose one over the other, and a practical example.

  1. Signature-Based (Header/Footer) Carving:

    • When: File system metadata missing or damaged.
    • Example: Recover deleted JPEGs by scanning for FFD8…FFD9 in raw image.
  2. File System–Aware Carving:

    • When: Metadata structures intact.
    • Example: Use MFT entries on NTFS to rebuild DOCX files with accurate offsets.
  3. Cluster-Based Carving:

    • When: Files are contiguous and fragmentation is low.
    • Example: Extract log files by reading whole clusters sequentially from a FAT volume.

Compare open-source vs commercial forensic suites on features, cost, and support.

Aspect Open-Source (Autopsy, Volatility) Commercial (EnCase, FTK)
Features Core analysis, extensible via plugins Advanced workflows, integrated modules
Cost Free License fees ($1K–$5K+ per seat)
Support Community forums, limited official docs Vendor support, training, SLAs
Updates Community-driven, variable frequency Regular vendor updates and patches

Question on AWS forensics.

Scenario: An organization’s AWS account shows unauthorized S3 access.

Answer: Artifact Collection:

Preservation & Analysis:

  1. Copy logs to a WORM-protected bucket; snapshot volumes via AWS CLI.
  2. Verify hashes of logs and snapshots.
  3. Parse CloudTrail JSON with jq or load into SIEM; correlate user-IDs, IPs, timestamps.
  4. Analyze EBS mounts in a sandbox VM to inspect file changes.

Legal/Procedural Considerations:

Question on mobile forensics.

Scenario: You receive a rooted Android device suspected of containing evidence.

Answer:

  1. Acquisition:

    • Document device details (IMEI, OS, root method).
    • Enable Airplane Mode; disable network to prevent remote wipes.
    • Use ADB & dd to image /dev/block/mmcblk0; or UFED for a logical + physical extraction.
  2. Verification:

    • Compute MD5/SHA256 hashes of each partition image and original.
  3. Analysis:

    • Mount images; extract app data from /data/data/<package>.
    • Open SMS/Call logs (mmssms.db) with SQLite Browser.
    • Bypass lock screen by replacing locksettings.db via ADB or using adb shell content commands.
  4. Reporting:

    • Log tools, commands, timestamps and findings in the chain-of-custody record.
    • Include screenshots, exported artifacts and hash lists in the final report.

Major Challenge:

What is an email header? Name two fields you examine and explain what investigative insight each provides.

An email header is the metadata block at the top of a message that records its path and origin details.

Define steganography, give one way it can hide data in images or audio, and mention one forensic challenge it poses.

Steganography is the practice of embedding secret data within innocuous files so the hidden content is not apparent.

Explain the purpose of hashing in evidence handling, outline how you generate/verify a hash, and state why it’s critical.

Hashing produces a fixed-length “fingerprint” of data to prove integrity—and detect any alteration.

  1. Generate: Run a tool (e.g., md5sum or sha256sum) on the original file or disk image to record its hash.
  2. Verify: After transfer or imaging, run the same tool on the copy and compare hashes—identical values confirm no changes.

Define both terms (swap file and prefetch file), give one example of each, and explain why you’d choose one over the other in practice.

List key browser artifacts (history, cache, cookies). Explain how you’d extract and interpret each artifact in an investigation. Give one real-world example of how browser data solved a case.

  1. History: SQLite database of visited URLs.
    • Extraction: Copy the History file from the user profile and open with a SQLite viewer.
    • Interpretation: Timeline of sites visited and durations.
  2. Cache: Stored page resources (HTML, images, scripts).
    • Extraction: Export cache folder or use tools like ChromeCacheView.
    • Interpretation: Reconstruct viewed pages and download artifacts.
  3. Cookies: Key–value pairs storing session tokens and preferences.
    • Extraction: Copy Cookies SQLite file and inspect with browser dev tools or scripts.
    • Interpretation: Identify logged-in services, active sessions and session expiry.

Describe three common methods (dictionary attack, brute-force, rainbow-table). For each, outline the basic process, a tool you might use, and one drawback. Name one preventive control against each technique.

  1. Dictionary Attack
    • Process: Hash each word from a wordlist (e.g., rockyou.txt) and compare to stolen hashes.
    • Tool: Hashcat
    • Drawback: Fails against passwords not in the list.
    • Preventive Control: Enforce complex, random passphrases not found in dictionaries.
  2. Brute-Force Attack
    • Process: Try every possible character combination up to a certain length.
    • Tool: John the Ripper
    • Drawback: Exponentially slow as password length increases.
    • Preventive Control: Implement account lockout or rate-limiting after failed attempts.
  3. Rainbow-Table Attack
    • Process: Use precomputed tables of hashes to reverse common passwords instantly.
    • Tool: OphCrack
    • Drawback: Large storage requirements; ineffective against salted hashes.
    • Preventive Control: Salt all password hashes (unique per user) before storage.

Define:

List and explain five essential fields found on a chain-of-custody form.

  1. Case Number: Links the evidence to a unique investigation ID.
  2. Item Number: Unique identifier for each evidence piece, preventing mix-ups.
  3. Description of Evidence: Brief summary (device type, serial/filename) so anyone can recognize the item.
  4. Date/Time & Location Collected: Records when and where the evidence was seized to establish context and prevent disputes.
  5. Transfer Log (Name, Signature, Date/Time): Chronological record of every person who handled the evidence, proving no unauthorized access or tampering.

Briefly outline the key stages of eDiscovery in a digital investigation and name one tool commonly used at each stage.

  1. Identification: Locate relevant ESI sources (email, file shares).
    • Tool: Microsoft Purview eDiscovery
  2. Preservation: Apply legal holds to prevent data alteration.
    • Tool: Microsoft Purview Hold
  3. Collection: Acquire targeted data with forensically sound methods.
    • Tool: FTK Imager
  4. Processing: Index, de-duplicate and convert files for review.
    • Tool: Nuix Workstation
  5. Review: Tag and analyze documents for relevance.
    • Tool: Relativity
  6. Production: Export responsive documents in required formats.
    • Tool: Relativity

Compare hardware write-blockers with software-based blockers in terms of reliability, cost, and use cases.

Define “forensic readiness” and describe three organizational measures that support it.

  1. Log Retention Policy: Mandate centralized collection and retention of system, network and application logs for a defined period.
  2. Incident Response Playbook: Documented procedures assigning roles, tools and steps for rapid forensic data capture.
  3. Write-Once Storage: Deploy WORM-capable servers or immutable cloud buckets to preserve evidence integrity.

Question on social media forensics.

Scenario: Investigators need to collect and analyze evidence from a user’s social-media accounts. Describe the process of acquiring posts, messages, and metadata from platforms like Facebook or Twitter. Highlight two legal or privacy considerations when gathering this data. Explain how you’d validate authenticity and present your findings in court.

Answer:

  1. Obtain legal authorization (warrant or user consent).
  2. Use platform APIs or specialized tools (e.g., X1 Social Discovery, Magnet AXIOM) to export posts, messages and metadata (timestamps, geolocation, IP).
  3. Record export method, hash each dataset and store in a forensically sound repository.
  1. Platform Terms of Service and user privacy settings may limit data access.
  2. Cross-border data privacy laws (GDPR, local statutes) require proper jurisdictional warrants.

Question on memory forensics.

Scenario: A suspect’s computer RAM has been acquired as a dump file.

Answer:

  1. Run volatility imageinfo to identify the correct OS profile.
  2. Load image: volatility -f memory.dmp --profile=<profile> pslist for running processes.
  3. netscan or connscan to list network connections.
  4. dlllist to view loaded modules for suspicious DLLs.
  5. cmdscan/consoles to recover command-line history.