SECTION A: Scenario-Based Questions - 60 Marks
Question 1: Analysing System Storage
A digital forensic investigator is tasked with examining a compromised workstation
suspected of unauthorised data exfiltration.
{a) Explain how the investigator would apply Master File Table (MFT) and Registry
analysis to determine evidence of user activity.
[6 marks]
{b) Discuss how the Autopsy tool assists in forensic analysis and how it differs from
traditional log examination.
[4 marks]
Question 2: Analysing System Memory
During an advanced persistent threat (APT) investigation, the attacker used fileless
malware suspected to reside in memory.
Describe the end-to-end methodology for memory analysis, including tool selection
(e.g., Redline and Volatility) and the indicators of compromise (loCs) that should be
extracted.
[10 Marks]
Question 3: Reporting After Log Analysis
You have completed an investigation into an insider threat that involved the
exfiltration of confidential documents.
Draft an outline of a professional incident response report that includes incident status,
findings, timelines, technical analysis, and recommendations.
[10 marks]
Question 4: Intrusion Detection and Network Forensics
You have completed an investigation into an insider threat that involved the
exfiltration of confidential documents.
Draft an outline of a professional incident response report that includes incident status,
findings, timelines, technical analysis, and recommendations.
[10 marks]
Page 2