Question 3
A closer look at Network forensic investigation reveals that the procedure for collection,
preservation, documentation etc. can be very cumbersome if compared to ordinary
Computer forensics investigations. Discuss how the following can pose challenges during a
network forensics investigation.
(12 marks)
i. Search warrant
ii. Required time for evidence collection
iii. Byte by byte copy of network computer
Question 4
a)"Digital investigations can fall I into two categories: public-sector and private-sector
investigations. Although private-sector investigations often start as civil cases, they can
develop into criminal cases; likewise, a criminal case can have implications leading to a civil
case" (Nelson, Phillips & Steurt,2016).
a) Outline any five (5) most common types of litigation in private sectors.
(5 marks)
b) Discussthe most important precaution an expert should take into consideration
when conducting a digital forensics investigation for a private company.
(5 marks)
Question 5
a) Briefly describe the main objective or contribution of Sedona principles in e-discovery.
(5marks)
b) E-discovery litigations are characterized by overwhelming amount of electronic
evidence creating necessity for reducing the volume of information to what is relevant.
Describe by means of a well labelled diagram a step-by-step approach for addressing
the above-mentioned concerns.
(12 marks)
Question 6
A bank has hired your firm to investigate employee fraud. The bank uses four 20 TB
machines on a LAN. You're permitted to talk to the network administrator, who is familiar
with where the data is stored. What diplomatic strategies should you use? Which
acquisition method should you use? Write a one to two pages report outlining the problems
you expect to encounter, explaining how to rectify them, and describing your solution.
Be sure to address any customer privacy issues.
(30 marks)
*****END OF PAPER*****
Page 2 of2