Question 1
[5 marks]
Match each cloud forensics concept or challenge in Column A with its corresponding
description or action in Column B by writing the correct letter (A-E)
,Column A: Concept/Challenge Answer Column B: Description/ Action
\\1.Establish legal and contractual
A. Capture memory dumps (volatile) and disk
lc1arity
images (non-volatile) to retain critical data.
\\2.Understand Cloud Service
,Models and Deployment Types
B. Ensure agreements define data access,
ownership, and forensic responsibilities before
investigation.
3. Collaborate with Cloud Service 1
Providers
4. Collect volatile and non-volatile!
data
'--
5. Preserve evidence with
minimal alteration
II-
C. Recognize Saas, PaaS,laaS, and public, private,
or hybrid clouds to guide investigation scope.
10.Work with providers to access logs, backups,
or virtual machine snapshots.
I1E. Use hashing (e.g., MOS, SHA-1) and write-
lblockers to avoid modifying original data.
Question 2
[15 marks]
Understanding Android data acquisition techniques and their interaction with the system's
security and file structure is essential for effective mobile forensic investigations.
Briefly explain the difference between logical extraction, physical extraction, and file
system extraction in the context of Android data acquisition. Provide one practical example
of when each technique might be used.
Question 3
[15marks]
Examine the following Android forensic data extraction workflow diagram which consists of
Device identification, Selection of extraction method, Data acquisition, Data analysis, and
Reporting. Select and explain any stage from the provided workflow where data integrity
could be compromised if proper procedures are not followed.
(15)
Page 1 of3