Description
see
Assignment 2
Deadline: Wednesday 12/11/2025 @ 23:59
[Total Mark for this Assignment is 8]
Student Details:
Name: ###
ID: ###
CRN: ###
Instructions:
• You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on
Blackboard via the allocated folder. These files must not be in compressed format.
• It is your responsibility to check and make sure that you have uploaded both the correct files.
• Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between
words, hide characters, use different character sets, convert text into image or languages other than English
or any kind of manipulation).
• Email submission will not be accepted.
• You are advised to make your work clear and well-presented. This includes filling your information on the cover
page.
• You must use this template, failing which will result in zero mark.
• You MUST show all your work, and text must not be converted into an image, unless specified otherwise by
the question.
• Late submission will result in ZERO mark.
• The work should be your own, copying from students or other resources will result in ZERO mark.
• Use Times New Roman font for all your answers.
Restricted – مقيد
Question One
Pg. 01
Learning
Outcome(s): 04
The student will
be able to
demonstrate
competence and
broad
understanding to
secure digital
assets and
develop
knowledge of
major incidents of
cybercrime.
Restricted – مقيد
Question One
2 Marks
Explain how white and blacklisting are implemented in law enforcement.
Answer:
Question Two
Pg. 02
Learning
Outcome(s): 04
The student will
be able to
demonstrate
competence and
broad
understanding to
secure digital
assets and
develop
knowledge of
major incidents of
cybercrime.
Restricted – مقيد
Question Two
2 Marks
You are analyzing a forensic disk image and need to locate potential email addresses.
Write the regular expression you would use to find email addresses end with the
domain .org.
Answer:
Question Three
Pg. 03
Learning
Outcome(s): 04
The student will
be able to
demonstrate
competence and
broad
understanding to
secure digital
assets and
develop
knowledge of
major incidents of
cybercrime.
Restricted – مقيد
Question Three
2 Marks
Explain what each part of the command does. Give an example of a candidate
password that this command would try (show how it’s built).
hashcat -a 6 -m 0 hashes.txt 10_million_password_list_top_1000000.txt ?d?d?d?s
Answer:
Question Four
Pg. 04
Learning
Outcome(s): 04
The student will
be able to
demonstrate
competence and
broad
understanding to
secure digital
assets and
develop
knowledge of
major incidents of
cybercrime.
Restricted – مقيد
Question Four
Identify and explain the marked parts of the partition table in the figure.
Answer:
2 Marks
Purchase answer to see full
attachment