Welcome back to Digital Forensic Concepts. This is our final project for this path. Our first question is, what are the four phases in a complete computer forensic examination? Question 2, what is the difference between criminal and civil offenses? Question 3, what does the fourth amendment guarantee the people? Question 4, what is a consent search, and can consent be withdrawn? Question 5, what is a preservation request? Question 6, what is a search warrant? Question 7, explain the Daubert Rule. Question 8, what are ethics and how do they relate to digital forensics? Question 9, what is Lockard's Principle of Exchange? Question 10, list the stages of the scientific method. Question 11, what is the difference between a witness and an expert witness? Question 12, what are the 3V's of big data forensics? Question 13, give examples of how a crime scene can be documented. Question 14, what is digital evidence? Question 15, what facts should be documented when collecting evidence? Question 16, what does preservation of digital evidence entail? Question 17, if you find a device that is turned off, in general, you should do what? Question 18, if you find a device that is turned on, in general, you should do what? Question 19, when should an examiner use right protection and why would an examiner use right protection? Question 20, what is volatile data? Question 21, what is encryption? What data types can encryption be applied to? Question 22, what would be some reasons to conduct live imaging? Question 23, when and why do forensic examiners only use sterile media for evidence collection? Question 24, why do forensic examiners validate their hardware and software tools? Question 25, what does a full forensic image of a physical disk contain? Question 26, what is a hash value? Question 27, will the size of the data change the length of the hash value? Question 28, list some of the common uses of hashing. Question 29, describe the TCP Transmission Control Protocol handshake used to initiate data transfer. Question 30, what is the function of DNS, Domain Name Service? Question 31, what is a MAC address? Question 32, what are case specific keywords? Question 33, what would a forensic examiner be looking for using this GREP search? Grep '[0-9]\ {1,3\ } \.[0-9]\ {1,3\ } \.[0-9]\ {1,3\ } \.[0-9]\ {1,3\ }' Test.txt. Question number 34, what are some of the limitations of text-based keyword searches? Question 35, what are some of the considerations in qualities of a forensic examiner must think about to produce a well-written report? End of final project questions.