Question 1:
Recognize the dissimilar data acquisition techniques we use in digital forensics.
Question 2:
Making a bit-stream image is simple in theory, but the accurateness of backup should meet evidence standards.
i. How do we authenticate the accuracy of bit stream copy?
ii. Name and illustrate out a hashing technique employed for verification.
Question 3:
In the context of digital forensic analysis, illustrate out the following terms:
i. Alternate Data Streams
ii. Steganography
Question 4:
Illustrate out with proper instances how to identify an Alternate data stream on NTFS system.