Preview

Quiz Computer Forensic & Investigation

Satisfactory Essays
Open Document
Open Document
352 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Quiz Computer Forensic & Investigation
Hanley Strappman, 37, was trying to learn about the Computer and Digital Forensics program at Champlain College. He was able to obtain some files, which he put on a floppy disk. To disguise his espionage, he decided to smuggle the floppy back home after altering the files so that they couldn't be read using the ordinary DOS/Windows file manager.

His deception was discovered, however, and the floppy has been recovered. Some of your counterparts have already tried to examine the disk to no avail. Upon discussions with Hanley, he has boasted that there are three files on the disk but that "You'll never know what I got!!"
You are being provided with a forensically true and accurate copy of Hanley's floppy disk. You are asked to examine the floppy disk and provide answers to a few questions about the integrity of the data that was recovered (in terms of maintaining the evidentiary chain), the recovery of certain information, and any actions that the suspect may have taken to intentionally delete, hide and/or alter data on the floppy disk. Good Luck!

Using the software tools provided to you in class, audit the disk and conduct a full analysis of any artifacts found on the media. The following questions must be completed in the time allotted:

The Questions
1. What is the name and address of the person to whom Hanley wrote a letter?

Dr. John Watson
8295 Martha Lane
Los Alamitos, CA 90720

2. Who is in the picture that Hanley obtained?

Lewis Carroll, Edith, Lorina and Alice Lidell

3. What is the information that Hanley supplied in a password-protected form?

A file named “curriculum” in Microsoft Excel format.

4. What are the names of the files on the floppy? Each was hidden or obscured in a different way; indicate how you found the files and how you recovered the information.

The file name is cc_stuff.exe Change the format to the .zip format and enter the password to get the information

5. Where did you find the password?

You May Also Find These Documents Helpful

  • Satisfactory Essays

    3. How is blood type determined? What happens if someone is given the wrong type of blood in a blood transfusion?…

    • 372 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    5. When a bullet is retrieved, how is it marked for identification purposes? What should be avoided?…

    • 601 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 1 Study Guide

    • 846 Words
    • 4 Pages

    A full backup of the drive on which Windows is installed and an ASR floppy disk on which information that will help Windows use Automated System Recovery is stored…

    • 846 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Forensic 10.07

    • 842 Words
    • 3 Pages

    What is a questioned document? Describe at least one example of something that might be a questioned document.…

    • 842 Words
    • 3 Pages
    Good Essays
  • Good Essays

    6.07 Forensics

    • 287 Words
    • 2 Pages

    2. It is important because it is society that scientists can out together, they have what they need.…

    • 287 Words
    • 2 Pages
    Good Essays
  • Good Essays

    1)Several specialized forensic fields are devoted to studying biological evidence at a crime scene. One of these fields is forensic palynology, the study of pollen and spore evidence to help solve criminal cases…

    • 1014 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Forensics2E Lab02 AW

    • 256 Words
    • 2 Pages

    drive. You prepared the contents of the seized hard drive using a variety of forensic tools as…

    • 256 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Forensics Lab

    • 289 Words
    • 2 Pages

    1) There are many things that can make a dental pattern unique, but reality is everyones teeth markings are different. After biting into the Styrofoam cup you could identify whos impression was who’s by looking at the width and length or the marking, also the deepness.…

    • 289 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1. What is a questioned document? Describe at least one example of something that might be a questioned document.…

    • 650 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The BTK Killer

    • 654 Words
    • 3 Pages

    “The floppy did me in.” Words from notorious serial killer Dennis Rader, also known as the BTK killer. Rader’s spree of violence lasted nearly 30 years and included 10 victims. Raider’s actions were strange, in the way that he communicated to the police. He truly enjoyed taunting the police and gloating about his crimes. His usual way of communicating with the police was through letters or 3x5 cards that he would send to the police directly or to the local television station. In one communication to the police department Raider stated “Would it be secure for the murderer to communicate with police via a floppy disk?” Knowing that having a different form of evidence to analyze the police told Dennis Raider that would…

    • 654 Words
    • 3 Pages
    Good Essays
  • Good Essays

    microsoft notes

    • 1216 Words
    • 5 Pages

    A user would like to secure files stored on a floppy disk. Which file system should they select to format the disk?…

    • 1216 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Lab 1

    • 414 Words
    • 2 Pages

    2. Which items within WinAudit’s initial report would you consider to be of critical importance in a computer forensic investigation?…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Ethics Of Dumpster Diving

    • 396 Words
    • 2 Pages

    Based on the nature of the disposal, a computer hacker may acquire an array of details and information from improperly disposed materials and equipment, such as electronic equipment and computers. For example, if a computer is not properly wiped and securely disposed of, computer hackers who obtain such may be able to recover any and/or all data…

    • 396 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Forensic Science Quiz

    • 766 Words
    • 4 Pages

    Please complete the following questions. It is important that you use full sentences and present the questions and answers when you submit your work. Submit the work as a file attachment. This means you complete all work in a word processing document (e.g., Microsoft Word) and attach the file using the dropbox tool. Use the Unit 1: Text Questions dropbox basket.…

    • 766 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Doc. Unix

    • 1228 Words
    • 5 Pages

    1. You have just finished a 25-page paper that you have written using Emacs.The file…

    • 1228 Words
    • 5 Pages
    Good Essays