Reference no: EM133240155
Topic 1
The registry is often used to harvest information for forensics purposes. A good analyst can glean a lot of information that can be used for cyber security reports.
Research at least 2 links online and document at least 3 things that can be pulled from the registry. Several examples of the information that could be learned from the registry are listed below.
You should include the registry keys along with your examples. Describe how this information would be useful in either a legal or forensics instance. You should give different examples from the ones below.
What documents did a user open up?
What wireless networks did the computer connect to?
Topic 2
1. Using static routes over dynamic routing protocols has both advantages and disadvantages. Research and talk about what some of these are. Give examples of environments where static routes would be preferred.
2. It can be said that every router must have at least one static route. Explain why this statement might be true.
Topic 3
The Project Management Institute (PMI) defines five process groups. Is one group more important than another to the overall success of the project? If so, explain why. Is the order of the process groups important? Do you see any flexibility in this order?
2. A key result of the Initiating Process is the Project Charter. Describe the purpose and importance of this artifact. Does every Project Charter require all the elements outlined in the text? Describe why or why not.
3. One of the elements of the Project Charter is to describe high-level requirements. In this context, how would define the term 'requirements'? Are requirements part of the informal personal projects we finish as part of our daily lives? Describe why or why not and if applicable, give an example.