Explain wat is Forensic Analysis and it can be used for what purpose?
List and briefly explain the four (4) Incident Response Plan.
List and briefly describe the 4 phases of NIST publication SP 800-86.
Describe what are Rootkits and the danger of Rootkits.
Describe what is Network Forensics?
Describe the concept of Dead-Box VS Network Forensics
List and briefly describe technical challenges in Cloud Forensics.
List and describe at least three (3) methods of hiding data.
Sample Solution