This preview shows page 1. Sign up to view the full content.
Unformatted text preview: NT Advanced Information
Security 4. Please write down the last modified date and time of the powerpoint document “Digital
5. Please write down the name of presenter and his/her affiliation of the powerpoint document
“Digital Evidence Standards”.
6. With how many different people from the AccessData Company, Frodo has exchanged emails?
Please write down their names.
7. Please enumerate 2 different subjects of emails addressed/CCed to the following email account:
8. What is the “only down side” of a new computer forensic section?
A. Calculate the hash again after your forensic investigation is over and please write it down,
including date and time.
B. Search in Google to understand why hash is important and reference at least one case law to
corroborate your findings. References...
View Full Document
This document was uploaded on 04/04/2014.
- Spring '14