Use correct in-text citations and ONE list of references at the bottom of the exam.
These criteria will be used to evaluate your submission:
Quality and originality of the response to each question
Research reflected in each response
Grammar/spelling/communications style.
- Discuss at least 3 methods that can be used to hide data and three approaches to recovering that hidden data.
- How does the boot process differ between Unix, Macintosh, and Windows systems?
- What are the basic guidelines to identify steganography files?
- Discuss the role that volatility plays in a digital forensics investigation. What would be the most volatile data?