Question Bank
Question Bank
Answer:
File carving is a technique used in disk forensics to recover files without relying on file
system metadata (like file names or directory paths). It works by identifying specific file
signatures—called "headers" and "footers"—to locate the beginning and end of files on the
disk.
For example, a JPEG image starts with the hex code FF D8 and ends with FF D9. Even if the
file is deleted or the file system is damaged, forensic tools can still search for these patterns
and recover the file content based on them.
Limitations:
      If the file is fragmented, meaning it's stored in non-contiguous blocks, the recovered
       file may be incomplete or corrupted.
      If the file system is heavily overwritten, file headers/footers might be destroyed,
       making recovery difficult.
      Carved files usually lose original metadata, like file name, path, and timestamps,
       which are important for investigations.
Answer:
In network forensics, log analysis and session reconstruction are two critical techniques to
trace and understand how an attacker interacted with a system.
      Log analysis involves reviewing logs from firewalls, servers, routers, and
       applications to identify unusual or unauthorized activity. Logs show data like login
       attempts, IP addresses, timestamps, and accessed resources. This helps investigators
       see what happened, when, and from where.
      Session reconstruction means reassembling the sequence of data packets (using tools
       like Wireshark) to recreate what a user or attacker did during a network session—like
       downloading a file, entering credentials, or uploading malware.
Example: If an attacker used a remote desktop connection to break into a server, logs may
show the IP and login time, while session reconstruction could reveal the commands they
executed or the files they accessed.
Together, these techniques give a complete picture of the attack, making it easier to identify
what was compromised and how.
3. In the context of database forensics, explain the importance of transaction
logs and how they can be used to trace unauthorized data manipulation.
Answer:
In database forensics, transaction logs are records that keep track of all changes made to the
database—like data insertions, deletions, and updates. These logs are automatically generated
by most database management systems (DBMS) to ensure data consistency and recovery in
case of failure.
Importance in forensics:
      Transaction logs allow investigators to track what actions were performed, when,
       and by whom.
      They help in identifying unauthorized changes like deletion of sensitive records or
       insertion of false data.
      Investigators can reconstruct the sequence of events leading to a data breach or
       insider attack.
Example: If a database record was deleted to cover up fraud, the transaction log can show
which user performed the deletion, at what time, and possibly even allow recovery of the
deleted record.
Thus, transaction logs are vital in proving misuse and providing a reliable audit trail during
investigations.
1. Disk Forensics
Q: What is the significance of slack space in disk forensics, and how can it aid in an
investigation? A: Slack space is the leftover space in a disk cluster that isn't fully used by the
current file. It may contain parts of previously deleted files. Forensic investigators examine
slack space to find hidden or leftover data that could be important in a case.
2. Network Forensics
Q: How can packet capture tools assist in reconstructing a cyber attack? A: Packet
capture tools, like Wireshark, record data packets on a network. Investigators use them to see
what data was sent and received, track communication with malicious IPs, and rebuild the
steps of an attack.
3. Database Forensics
Q: What types of metadata are useful during a database forensic analysis? A: Useful
metadata includes timestamps of changes, user access logs, transaction logs, and backup
records. These help trace who accessed or changed data and when.
4. Wireless Forensics
Q: What makes wireless network forensics more complex than wired network
forensics? A: Wireless networks are harder to monitor due to signal range, encryption,
interference, and device mobility. Anyone nearby can access the signal, making it more
vulnerable.
5. Malware Forensics
      Static analysis examines malware without running it. It is safe and good for getting
       an overview.
      Dynamic analysis runs malware in a secure environment to see what it does. It's used
       when behavior must be observed.
6. Mobile Forensics
Q: Why is logical extraction preferred over physical extraction in some mobile forensic
cases? A: Logical extraction is safer and quicker. It retrieves visible data like contacts,
messages, and call logs. It's preferred when devices are locked or physical access isn't
allowed.
7. GPS Forensics
Q: How can GPS data help in establishing a timeline during forensic investigation? A:
GPS records show where and when a device was used. Investigators use this to track
movements, confirm locations, or check if someone was at a crime scene.
8. Email Forensics
Q: What are email headers, and how do they help in tracing the origin of an email? A:
Email headers contain routing details like IP addresses, sender info, and time stamps. They
help investigators trace the path an email took and identify its true source.
9. Memory Forensics
Q: What kind of artifacts can be retrieved from volatile memory during a live analysis?
A: Live memory analysis can reveal running programs, passwords, open files, encryption
keys, and malware in action. It's useful for real-time evidence.
Q: List the key phases of the incident handling lifecycle and explain their roles. A:
Q: What challenges arise in acquiring digital evidence from IoT devices? A: IoT devices
have limited storage, use various formats, and often lack standard tools. Data may also be
stored remotely.
Q: How does the forensic acquisition process vary between desktops, laptops, and
smartphones? A:
Q: How can analyzing the boot process help detect a rootkit or bootkit? A: Rootkits and
bootkits hide during startup. Analyzing the boot sequence can reveal hidden or abnormal
code.
Windows/Linux Artifacts
Q: What kind of user activity can be traced from the Windows Registry during forensic
analysis? A: It can show USB use, installed programs, recent files, and user logins.
Q: Explain how browser cache and history files can be used as evidence. A: They show
visited websites, downloaded files, and search terms. Useful for tracking online behavior.
Q: What are common Linux log files examined during a forensic investigation and what
insights do they provide? A:
Q: What are the forensic challenges posed by full disk encryption? A: Data can’t be
accessed without a key. If the system is off, evidence may be locked. Investigators must
capture it while the system is on.
Q: What techniques are used to bypass screen locks for forensic acquisition of mobile
data? A: Methods include forensic tools (like Cellebrite), exploiting software bugs, and
custom recovery modes.
Q: Why is jurisdiction a major issue when acquiring digital evidence from the internet?
A: Servers are in different countries. Each country has its own laws, so getting data may need
international cooperation.
      Relevance
      Authenticity
      Integrity
      Proper collection method
Q: Why should forensic analysts avoid powering down a system immediately during
evidence seizure? A: Shutting down loses data in RAM. Important information like
passwords or running malware may disappear.
Q: What is the role of a chain of custody form, and how does it ensure evidence
integrity? A: It logs every person who handled the evidence. It ensures the evidence was not
changed or tampered with.
Q: Compare live acquisition and dead acquisition. When is each method appropriate?
A:
      Live acquisition: When the system is on; captures RAM and active sessions.
      Dead acquisition: After shutdown; used for full disk imaging. Safer but misses live
       data.
Q2: Describe how log analysis and session reconstruction help in understanding an
attacker’s activity in network forensics.
A: Logs store information about network activity like IP addresses, login attempts, and file
access. Analyzing logs helps identify suspicious behavior. Session reconstruction rebuilds
entire communication sessions to show exactly what the attacker did, like commands used or
data stolen.
Q3: In the context of database forensics, explain the importance of transaction logs and
how they can be used to trace unauthorized data manipulation.
A: Transaction logs keep a record of all database operations. They help identify who changed
what data, and when. This is crucial in detecting unauthorized deletions, changes, or inserts
made by malicious insiders or attackers.
Q5: How can sandboxing and reverse engineering contribute to malware forensics?
Explain with an example.
A: Sandboxing runs suspicious programs in an isolated environment to observe behavior, like
data theft. Reverse engineering dissects malware code to understand how it works. For
example, analyzing ransomware can reveal encryption methods and possible decryption keys.
Q6: Why is mobile forensics highly device-specific? Discuss the challenges associated
with forensic analysis of Android vs iOS devices.
A: Each mobile device has different hardware, OS, encryption, and security. Android devices
may allow more access with rooting, but file systems vary. iOS devices have strict security
and require jailbreaking or device-specific tools, making analysis difficult.
Q7: In GPS forensics, what are common sources of GPS data, and how can
discrepancies in timestamps affect legal admissibility?
A: GPS data comes from car systems, smartphones, fitness trackers, and apps. Incorrect or
manipulated timestamps can make evidence unreliable in court, so investigators must verify
time zones and device settings.
Q8: Evaluate how spoofing can impact the authenticity of email evidence, and what
forensic indicators are used to detect it.
A: Spoofing involves faking email addresses to mislead recipients. Forensics checks headers
for real sender IP, uses SPF, DKIM, and DMARC to verify legitimacy, and analyzes email
servers used in transmission.
  Memory Forensics and Incident Response
Q9: Explain the relevance of analyzing memory dumps in active cyber incidents. What
types of artifacts are most commonly retrieved?
A: Memory analysis helps uncover running processes, encryption keys, open connections,
passwords, and hidden malware. It provides a real-time snapshot of what was happening on
the system during an attack.
Q10: Describe the six phases of incident response. Which phase is the most critical in
ensuring that digital evidence is preserved?
A:
Critical Phase: Containment and Identification are crucial for preserving evidence before it
is lost or altered.
Q11: Why is a write blocker essential during the acquisition of digital evidence? What
could happen if a write blocker is not used?
A: A write blocker prevents changes to the original storage device during copying. Without
it, data could be accidentally altered, making the evidence invalid in court.
       Logical acquisition gets only visible files; faster and less invasive.
       Physical (bitstream) acquisition copies entire disk including deleted and hidden
        data; used when deeper analysis is needed.
Preferable when:
Q13: Discuss how timestamps (MAC times) can be manipulated and how a forensic
examiner can validate their authenticity.
A: MAC (Modified, Accessed, Created) times can be altered using tools or scripts. Forensic
tools check alternate metadata sources like log files, shadow copies, or system events to
confirm if timestamps are genuine.
💻 OS, File System, and Artefacts
Q14: Explain how bootkits can compromise the OS boot process and evade detection by
antivirus tools.
A: Bootkits infect the boot sector, loading before the OS. They hide their presence from
antivirus software, allowing attackers to control the system secretly from startup.
Q15: What forensic insights can be gained from analyzing NTFS Master File Table
(MFT)?
A: The MFT records every file’s details including creation, deletion, and changes. It helps in
recovering deleted files and understanding file system activities.
Q16: Identify key Windows Registry hives that store user activity and system
configuration. How can these be used in forensic reconstruction?
A: Key hives include:
Q17: Compare browser artifacts from Chrome, Firefox, and Edge. How do they store
and protect user history, cache, and login credentials?
A:
      Chrome/Edge use SQLite databases to store history and cache, with encrypted
       passwords.
      Firefox uses JSON and SQLite formats. Each browser stores logins in protected
       storage (like Windows Credential Manager).
Q18: What are “bash history,” “syslog,” and “auth.log” in Linux forensics? How can
they be used in tracing an attack?
A:
Q21: Discuss the concept of "cloud forensics." What are jurisdictional, technical, and
legal challenges in acquiring evidence from cloud-based platforms?
A: Cloud forensics involves retrieving data from online platforms. Challenges:
Q23: What is the difference between volatile and non-volatile evidence? Give examples
and explain how this affects the sequence of collection.
A:
Q24: Describe the steps involved in preparing an evidence collection report. Why is
documentation as important as the evidence itself?
A: Steps:
Q25: What is meant by "forensic readiness"? How can an organization prepare its
infrastructure to support future forensic investigations?
A: Forensic readiness means being prepared to collect and analyze digital evidence when
needed. Organizations can:
       Enable logging
       Train staff
       Use secure backups
       Define incident response plans
Discuss the role of residual data and log artifacts in digital forensics by explaining the concepts of file
carving in disk forensics, session reconstruction in network forensics, and transaction log analysis in
database forensics. How do these techniques assist in investigations when primary data sources are
unavailable or tampered with? Also, highlight the limitations or challenges associated with each
technique."
Answer:
In digital forensics, when primary data (like original files, direct evidence, or complete logs)
is missing, deleted, or tampered with, investigators rely on residual data and log artifacts to
uncover what happened. These are traces or leftovers that can still tell the story. Let’s look at
three important techniques: file carving, session reconstruction, and transaction log
analysis.
What it is:
File carving is a method used to recover deleted files by looking for known patterns (like
headers and footers) in raw disk data—even when the file name or path is gone.
How it helps:
It allows investigators to retrieve files even after the file system is damaged or deliberately
erased. This is useful in criminal cases where someone has deleted evidence.
Limitations:
What it is:
Session reconstruction involves piecing together individual network packets to recreate the
full conversation or activity that occurred over a network (like web browsing, email, or file
transfer).
How it helps:
Even if logs are erased, captured packets (residual data) can help reconstruct what the
attacker did, what data was accessed, or what malware was downloaded.
Limitations:
         Requires full packet capture, which may not always be available.
         Encryption (like HTTPS) can hide actual content.
         Packet loss or incomplete captures make reconstruction difficult.
What it is:
Transaction logs record all operations performed in a database—such as data insertion,
update, or deletion.
How it helps:
Even if a user deletes or alters records, transaction logs can show what was changed, by
whom, and when. This is essential in fraud or data manipulation cases.
Limitations:
         Logs can be turned off or deleted by insiders.\n- Some logs are overwritten frequently
          (circular logs).\n- Specialized tools may be required to interpret them.
Q: List the key phases of the incident handling lifecycle and explain their roles.
A:
A:
A: It ensures the evidence has not been altered. Without integrity (e.g., verified by hash
values), evidence may be inadmissible in court.
A:
Q: How does the forensic acquisition process vary between desktops, laptops, and
smartphones?
A:
A:
Rootkits and bootkits load before the OS and can hide their presence. Boot analysis reveals
unauthorized bootloader changes or abnormal processes during startup.
Q: Why is it important to understand the file system (e.g., NTFS vs FAT32) before acquiring
evidence?
A:
Different file systems store metadata, timestamps, and deleted files differently.
Understanding the structure helps in accurate data recovery and analysis.
Q: What kind of user activity can be traced from the Windows Registry during forensic
analysis?
A:
Registry holds data on recently opened files, USB connections, user accounts, installed
programs, and system settings—helping reconstruct user behavior.
Q: Explain how browser cache and history files can be used as evidence.
A:
Cache stores downloaded data; history records visited URLs and timestamps. These artifacts
help track user intent, timelines, and internet activity.
Q: What are common Linux log files examined during a forensic investigation and what
insights do they provide?
A:
A:
Encryption prevents access without keys/passwords. If a system is off, evidence may be
unreadable. Live acquisition may be needed to capture decrypted data.
Q: What techniques are used to bypass screen locks for forensic acquisition of mobile data?
A:
Q: Why is jurisdiction a major issue when acquiring digital evidence from the internet?
A:
Different countries have different laws. Servers may be located across borders, and legal
requests (e.g., MLATs) are required to access data.
Q: Name three challenges in preserving digital evidence and suggest mitigation strategies.
A:
A:
Q: Why should forensic analysts avoid powering down a system immediately during
evidence seizure?
A:
Valuable volatile data in RAM (e.g., passwords, running processes) will be lost. Live
acquisition is preferred when volatile data is critical.
Q: What is the role of a chain of custody form, and how does it ensure evidence integrity?
A:
It documents who accessed the evidence, when, and why. It prevents tampering and supports
admissibility in court.
Q: Compare live acquisition and dead acquisition. When is each method appropriate?
A:
        Live acquisition: Performed while system is running (e.g., RAM, active network
         connections).
        Dead acquisition: After powering off, used for full disk imaging.
         Live is used when volatile data is crucial; dead is more secure and less risky for
         tampering.
1. Explain how file carving is used in disk forensics. What limitations does it
have when the file system is corrupted or overwritten?
Answer:
File carving is a technique used in disk forensics to recover files without relying on file
system metadata (like file names or directory paths). It works by identifying specific file
signatures—called "headers" and "footers"—to locate the beginning and end of files on the
disk.
For example, a JPEG image starts with the hex code FF D8 and ends with FF D9. Even if the
file is deleted or the file system is damaged, forensic tools can still search for these patterns
and recover the file content based on them.
Limitations:
        If the file is fragmented, meaning it's stored in non-contiguous blocks, the recovered
         file may be incomplete or corrupted.
        If the file system is heavily overwritten, file headers/footers might be destroyed,
         making recovery difficult.
        Carved files usually lose original metadata, like file name, path, and timestamps,
         which are important for investigations.
Answer:
In network forensics, log analysis and session reconstruction are two critical techniques to
trace and understand how an attacker interacted with a system.
      Log analysis involves reviewing logs from firewalls, servers, routers, and
       applications to identify unusual or unauthorized activity. Logs show data like login
       attempts, IP addresses, timestamps, and accessed resources. This helps investigators
       see what happened, when, and from where.
      Session reconstruction means reassembling the sequence of data packets (using tools
       like Wireshark) to recreate what a user or attacker did during a network session—like
       downloading a file, entering credentials, or uploading malware.
Example: If an attacker used a remote desktop connection to break into a server, logs may
show the IP and login time, while session reconstruction could reveal the commands they
executed or the files they accessed.
Together, these techniques give a complete picture of the attack, making it easier to identify
what was compromised and how.
Answer:
In database forensics, transaction logs are records that keep track of all changes made to the
database—like data insertions, deletions, and updates. These logs are automatically generated
by most database management systems (DBMS) to ensure data consistency and recovery in
case of failure.
Importance in forensics:
      Transaction logs allow investigators to track what actions were performed, when,
       and by whom.
      They help in identifying unauthorized changes like deletion of sensitive records or
       insertion of false data.
      Investigators can reconstruct the sequence of events leading to a data breach or
       insider attack.
Example: If a database record was deleted to cover up fraud, the transaction log can show
which user performed the deletion, at what time, and possibly even allow recovery of the
deleted record.
Thus, transaction logs are vital in proving misuse and providing a reliable audit trail during
investigations.
This question covers four important parts of digital forensics: live acquisition, dead
acquisition, system seizure, and mobile device screen lock bypassing. Let’s look at each
part in detail.
When it is used:
Dead Acquisition:
Dead acquisition is when data is collected from a system that is powered off. The storage
device (like hard disk) is removed and copied without running the device.
When it is used:
      When volatile data is not important or already lost\n- When system is stable and
       physical evidence is enough\n- Forensically safer, as data doesn’t change during
       collection
For Android:
      ADB (Android Debug Bridge): If USB Debugging was enabled before lock.
      Custom Recovery/Rooting: For older or vulnerable devices.
      Brute Force Tools: Like Cellebrite or Oxygen Forensic Detective.
      Exploit-based Tools: Exploit firmware bugs to access data.
Note: All techniques are used in controlled environments and under legal permissions, as
bypassing locks can affect data integrity.
Live and dead acquisitions are both important methods in digital forensics. Live acquisition helps
capture sensitive, temporary data, while dead acquisition provides safe and detailed storage
imaging. Forensic analysts must be careful not to power off systems immediately to avoid losing
volatile data. On mobile devices, screen locks can be bypassed using specialized forensic tools and
techniques depending on the type of phone and OS. All steps must be documented properly to
maintain the legal value of the evidence.
Q. Discuss the role of residual data and log artifacts in digital forensics by
explaining the concepts of file carving in disk forensics, session reconstruction
in network forensics, and transaction log analysis in database forensics. How do
these techniques assist in investigations when primary data sources are
unavailable or tampered with? Also, highlight the limitations or challenges
associated with each technique.
In digital forensics, investigators often deal with cases where the main evidence (like files,
logs, or records) has been deleted, damaged, or tampered with. In such cases, they rely on
residual data and log artifacts—these are leftover or indirect pieces of information that still
hold clues.
Let’s understand how these are used in three key areas: disk forensics, network forensics,
and database forensics.
How it helps:
Even if the file system is corrupted or files are deleted, file carving can retrieve important
data like documents or images that might be criminal evidence.
Challenges/Limitations:
What it is:
Session reconstruction means putting together captured network packets to rebuild the entire
communication between two systems (like an attacker and a victim).
How it helps:
It shows what an attacker did—such as logging into a server, transferring files, or sending
commands. Even if logs are missing, packet data can tell the story.
Challenges/Limitations:
      Requires full and continuous packet capture.\n- Encrypted sessions (like HTTPS)
       limit visibility.\n- If packets are missing or out of order, the session may be
       incomplete.
How it helps:
Even if data was deleted from the database, transaction logs can show who changed what
and when, helping trace fraud or insider threats.
Challenges/Limitations:
      Logs can be deleted or overwritten.\n- May require special tools or admin access to
       interpret.\n- Not all databases keep detailed logs by default.
When hackers or insiders try to hide their tracks by deleting files or logs, residual data like
disk fragments, leftover network packets, or database logs can act as secondary evidence.
These help:
File carving, session reconstruction, and transaction log analysis are powerful forensic tools
that help uncover hidden or deleted evidence. While they are very useful when primary data
is unavailable, each method has its own limitations, such as missing metadata, encryption, or
the need for technical tools. Still, these techniques are essential in solving cybercrime cases
and ensuring that justice is served.
Forensic Value:
Analyzing the boot process can help identify bootkits—a type of malware that
infects the boot sector. Bootkits load before the OS and can hide themselves
from antivirus tools, giving attackers control over the system without being
noticed.
Evidence Found:
Forensic Value:
MFT helps in reconstructing file history, such as:\n- When a file was created,
accessed, modified, or deleted (MAC times)\n- File names, sizes, and attributes
Example: If a hacker deletes malicious files, MFT can show traces of those
files even if they are no longer visible.
3. Windows Registry
The Windows Registry is a database that stores system settings and user
activity.
Key Registry Hives:
Forensic Value:
Registry analysis can show:\n- What programs were installed or uninstalled
Artifacts Found:
      Browsing history
      Cache and cookies
      Saved passwords and form data
      Download history
Forensic Value:
Browser artifacts help investigators know:\n- Which websites were visited (e.g.,
command-and-control servers)\n- If credentials were stolen or leaked\n-
Whether the user downloaded any malware or suspicious tools
Comparison:
Forensic Value:
These logs can:\n- Show commands used to download malware
By analyzing artifacts like the boot process, MFT, Windows Registry, browser
data, and Linux logs, forensic experts can reconstruct the full timeline of user
actions, system behavior, and potential attacks. These sources are crucial to
understanding:\n- How malware entered and behaved\n- What the attacker
accessed or changed\n- How the system was used before, during, and after an
incident\n\nWhile each type of artifact gives different insights, together they
form a complete picture of a cybercrime, helping investigators gather strong
digital evidence that can be used in court.
   A. Explain the possible mode of infection and how the ransomware payload
      might have executed.
   B. Outline the typical sequence of events in a ransomware attack and map
      them to the incident.
   C. Discuss why the antivirus software might have failed to prevent the attack
      in time.
   D. Analyze the role of the TOR network and the Dark Web in facilitating
      such attacks.
What challenges would investigators face in tracing the attacker using Deep
Web or Dark Web evidence?
A mid-sized financial firm has suffered a ransomware attack that encrypted
multiple employee systems. The infection started with a malicious PDF
attached to a phishing email. One system also showed TOR network activity
before the attack. Based on this, here is a detailed explanation of the incident:
        The attacker sent a fake email with a PDF attachment that looked
         trustworthy.
        When an employee opened the PDF, it ran hidden code that
         downloaded and installed the ransomware.
        The ransomware then executed silently, gaining access to files and
         starting the encryption process.
So, the attack started with human error (clicking a malicious file) and then
moved to system compromise through malware execution.
        The ransomware may have been new or customized, so its signature was
         not known yet.
        It might have used obfuscation (hiding its code) to avoid detection.
        Behavior-based detection may have been turned off or was too slow to
         respond.
        The malware may have executed in memory (fileless attack), which
         many antivirus tools cannot detect easily.
So, the antivirus reacted too late, after damage was already done.
TOR (The Onion Router) is used to hide identities and encrypt internet
traffic.
In this case:
The Dark Web gives attackers a safe zone to operate, communicate, and receive
money without revealing who they are.