Question

In: Computer Science

Use these textbooks to answer the questions; Chapter 5 in Windows Forensic Analysis DVD Toolkit 2nd...

Use these textbooks to answer the questions;

Chapter 5 in Windows Forensic Analysis DVD Toolkit

2nd Edition Chapter 5 in Mastering Python Forensics.

Note: Use both textbooks above and collected reliable online resources for your answers (you may utilize the tools mentioned in the textbook or other alternative tools on the internet). All external resources must be listed as references at the end of this document.

1. Briefly describe what and how events are logged in the OS you are using.

2. How do you configure auditing policy? Is auditing policy important in forensics? Why?

Solutions

Expert Solution

1. Briefly describe what and how events are logged in the OS you are using.

Answer: Logs are records of events that happen in your computer, either by a person or by a running process. They help you track what happened and troubleshoot problems. The Windows event log contains logs from the operating system and applications such as SQL Server or Internet Information Services (IIS). The logs use a structured data format, making them easy to search and analyze. Some applications also write to log files in text format. For example, IIS Access Logs. Windows Event Viewer displays the Windows event logs. This application to view and navigate the logs, search and filter particular types of logs, export logs for analysis, etc.

2. How do you configure auditing policy? Is auditing policy important in forensics? Why?

Answer: Configuring auditing policy:

  • From the Domain Controller, click Start, point to Administrative Tools, and then Group Policy Management.
  • From the console tree, click the name of your forest > Domains > your domain, then right-click on the relevant Default Domain or Domain Controllers Policy (or create your own policy), and then click Edit.
  • Under Computer Configuration, click Policies > Windows Settings > Security Settings > Advanced Audit Policy Configuration > Audit Policy, then double-click on the relevant policy setting.
  • In the right pane, right-click on the relevant Subcategory, and then click Properties.
  • Select Success, Failure, or both from the audit events checkbox and then click OK.

Auditing policy is important in forensics, A forensic audit is an examination and evaluation of a firm's or individual's financial records to derive evidence that can be used in a legal proceeding. A forensic audit may be conducted to prosecute a party for fraud, embezzlement, or another criminal behavior. A forensic audit/examination is designed to focus on reconstructing past financial transactions for a specific purpose, such as concerns of fraud, whereas an internal audit is typically focused more on compliance and/or the performance of the organization.


Related Solutions

Use these textbooks to answer the questions; Chapter 5 in Windows Forensic Analysis DVD Toolkit. 2nd...
Use these textbooks to answer the questions; Chapter 5 in Windows Forensic Analysis DVD Toolkit. 2nd Edition Chapter 5 in Mastering Python Forensics. Note: Use both textbooks above and collected reliable online resources for your answers (you may utilize the tools mentioned in the textbook or other alternative tools on the internet). All external resources must be listed as references at the end of this document. 1. What is the best way to uncover attempts to compromise an IIS webserver?...
Use the graph in Chapter 24- 3 (page 553 in text) to answer the questions that...
Use the graph in Chapter 24- 3 (page 553 in text) to answer the questions that follow. a. What is the monopolist’s profit-maximizing output? b. At the profit-maximizing output rate, what are average total cost and average revenue? c. At the profit-maximizing output rate, what are the monopolist’s total cost and total revenue? d. What is the maximum profit? e. Suppose that the marginal cost and average total cost curves in the diagram also illustrate the horizontal summation of the...
Use SPSS to conduct the necessary analysis to answer each of the questions based on the...
Use SPSS to conduct the necessary analysis to answer each of the questions based on the following scenario. If a statistical test is used, you should use .05 as the critical level of significance. You are a Nursing instructor at your institution. You teach Intro to Nursing. You want to know how your students’ final averages compare to institutional average for Intro to Nursing, which is 80. The final averages for your students are listed below. 90, 80, 77, 55,...
Use this case study to answer the questions below. CASE CHAPTER 1: INTRODUCTION TO RESEARCH THE...
Use this case study to answer the questions below. CASE CHAPTER 1: INTRODUCTION TO RESEARCH THE LAROCHE CANDY COMPANY In 1864 Henricus Laroche started making high-quality chocolate in his kitchen in Ooigem, Belgium. Henricus learned his trade at a famous chocolate shop in Paris, and he and his wife began to make chocolate in bars, wafers and other shapes soon after Henricus had returned to Belgium to start his own business. The Belgian people loved Laroche’s chocolate and the immediate...
Use these terms to answer these questions (can use more than once) Break-even analysis, Benefi-Cost analysis,...
Use these terms to answer these questions (can use more than once) Break-even analysis, Benefi-Cost analysis, Cost Effectiveness analysis If your boss wants to know how many cases of obesity need to be eliminated in a year to offset the cost of your weight management program, you should use: If you want to show your boss that a program with health coaches is worth the high cost since it will ultimately result in larger positive health outcomes and reduced health...
Scenario (use to answer questions 5-6) You are appointed the Chairperson of the FOMC. Use the...
Scenario (use to answer questions 5-6) You are appointed the Chairperson of the FOMC. Use the link below to run a monetary simulation. You are required to hit the inflation target. In order to receive credit, you have to reappointed by hitting both your inflation and unemployment targets. You can run the simulation as many times as necessary. When you are successful enter in the ending inflation and unemployment rates. http://www.frbsf.org/education/activities/chairman/ What is your ending inflation rate? A. Above 6.0%...
Use critical thinking and apply the information you learned in chapter 16. Answer all the questions...
Use critical thinking and apply the information you learned in chapter 16. Answer all the questions completely. Write a well written paragraph to answer each question. Your instructor is looking for 3-4 key points in your responses that relate to this week’s readings. Reference your information using the APA citation format. You will not be able to see what other learners have posted until you post your initial response. Participation in weekly discussion is worth a significant part of your...
Use the following scenario analysis for stocks X and Y to answer the questions. Bear Normal...
Use the following scenario analysis for stocks X and Y to answer the questions. Bear Normal Bull Market Market Market Probability 20.00% 45.00% 35.00% Stock X -13.00% 11.00% 28.00% Stock Y -26.00% 16.00% 46.00% Assume you have a $200,000 portfolio and you invest $75,000 in stock X and the remainder in stock Y. What is the expected return for this portfolio?
Use the following scenario analysis for stocks X and Y to answer the questions. Bear Normal...
Use the following scenario analysis for stocks X and Y to answer the questions. Bear Normal Bull Market Market Market Probability 35.00% 55.00% 10.00% Stock X -28.00% 9.00% 30.00% Stock Y -16.00% 15.00% 50.00% Assume you have a $200,000 portfolio and you invest $80,000 in stock X and the remainder in stock Y. If the risk–free rate of return is 3.75%, and we assume that the standard deviation of the excess returns on the portfolio is 15%, what is the...
Multiple Choice (20 marks) Query Questions (use the tables below to answer the 5 query questions...
Multiple Choice Query Questions (use the tables below to answer the 5 query questions below) The Business. A retail company sells electronics items by phone and on its web site. The company records information about each item sold in a table called Sales. A few rows of the Sales table in the database are shown below: Sales table (primary key = SaleID and ItemID) SaleID ItemID CustomerID ItemType SaleDate 101 151 52 4 1/1/2019 101 176 52 1 1/1/2019 102...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT