Course Hero Logo

CIS 4684 Lab 3.docx - Lab 3: Forensic Analysis of a Window...

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 1 - 2 out of 2 pages.

Lab 3: Forensic Analysis of a Window 10 ClientLoading the disk from the compromised machineI.Can you add a physical disk to Autopsy?
II.What other choice are there besides adding a physical disk to Autopsy?
III.What are some of the commercial forensic tools mentioned in thissection?
IV.What icon is used to launch the Autopsy Program?
Analyzing common locations of compromise artifactsI.Where can you check to see if a file is malicious?a.Event viewer filesb.Registry filesc.Startup folderd.Pathe.Scheduled tasks folder
II.What are some of important registry you should extract?
III.What are some of the important event viewer files that you should extract?
End of preview. Want to read all 2 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
NoProfessor
Tags
system log, Windows Registry, event ID

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture