Professional Documents
Culture Documents
Lab 5 Questions
Lab 5 Questions
Lab 5 Questions
Name:
G#:
Lab Questions:
5) What types of information might you find in the internet history files that might be of forensic
interest?
7) How might an investigator use a key logger? What legal authority would be required before a
keylogger could be used?
©2007, Updated 2014, 2015, 2021 Anne Marchant, Rebecca J. Pollard, Alex Mbaziir
1
By submitting this assignment, I certify I have abided by all requirements of the GMU honor code. I certify that
this is entirely my own work, no unauthorized sources have been used, and all sources used have been properly
cited.
Network Forensics Lab 5
©2007, Updated 2014, 2015, 2021 Anne Marchant, Rebecca J. Pollard, Alex Mbaziir
2
By submitting this assignment, I certify I have abided by all requirements of the GMU honor code. I certify that
this is entirely my own work, no unauthorized sources have been used, and all sources used have been properly
cited.