You are on page 1of 2

Ch1:

 Cyber crime is divided into 3 T’s mention it and explain one of them.
 A good forensic investigator should always have some rules mention it.

Ch2:

 Why the RAM is very important in digital forensics?


 We have 2 file (big File 8GB and small file 2GB ) The small file is deleted and write a Big
file calculate:
1) Active data .
2) Unallocated data.
3) Slack data.
4) Retrieve data

Ch 3:

 Compare between Accreditation and Certification.


 Put any question from yourself and answer it.
 Some forensics tools can identify header values.(T or F).

Ch4:

 What is the Purpose of Cloning in digital forensics?


 "Photos don't replace notes in digital forensics" explain why?

:Ch5

 Compare between Sleep VS. Hibernate in windows7.


 What is the Registry in windows? and what are the purposes from it?
 What is the metadata?

:Ch6

 How can you detection the Steganography ( as possible as) if you don't have any
tools ?
 Defragmentation Automatically performed monthly in Windows 7(T or F).

:Ch8

 Compare between Static . Dynamic Web Pages


 How Email can be as Evidence in digital forensic?

:Ch9

 What are the Network Types?


 Compare between IPv4. IPv6.
 Mention the NIST Process.
:Ch10

 what are the Cell Network Components?


 What are the Four Categories of GPS?
 whate are the Potential Evidence Items on Cell Phones?

You might also like