problem1. describe two limitations of the dead-box analysis.
problem2. Describe why memory analysis is difficult.
problem3. With reference to the “Shadow Walker” rootkit, describe what is meant by memory cloaking. What is the objective of memory cloaking?
problem4. Describe the Locard’s Exchange Principle. Support your answer with ex.
problem5. Name four useful data that may be collected throughout live acquisition.
problem6. Forensic methodology comprises three basic phases. Briefly describe these three phases.
problem7. Sometimes it’s best not to perform hard-disk acquisition. Provide two circumstances where it’s best not to perform hard-disk acquisition.